If you're concerned about the integrity of your network's infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network's defenses. You'll begin by learning how perimeter defesnses work. By scanning and attacking your own network (no real netowrks will be hardmed), you'll also learn how intruders operate and the steps to secure a system. In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.
Webserver and web application attacks and countermeasures
SQL injection attacks
Cloud computing threats
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.