Description
This course will allow you to master the concepts and technologies used by today’s hackers to better defend your institution.
WHAT YOU WILL LEARN:
- The four step process: information gathering, scanning, exploitation, and post exploitation
- How attackers leverage the web
- Post scanning, fingerprinting, and versioning techniques
- Vulnerability scanning with Nessus
- Exploitation and privilege escalation utilizing John the Ripper
- Exploitation with Metasploit
- Exploiting the human by “hacking” users
- Post exploitation and meterpreter
WHO SHOULD ATTEND:
- IT Manager, Network Administrator, IT Specialist
By purchasing this certification, you are hereby agreeing to the policies and procedures of the SBS Institute. Click HERE to read and review.
Cost: $999