Overview
This course employs a hands-on training environment to provide a systematic ethical hacking process. You will learn creative techniques of achieving optimal information security posture in the target organization. You will practice the skills to scan, test, hack and secure target systems while covering the Five Phases of Ethical Hacking: Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Prerequisite: Intro to Ethical Hacking