At the end of this course, participants will be able to:
Identify the role of Ethical Hacking in today’s network security environment;
Describe the characteristics of criminals and professionals in the cybersecurity realm;
- Describe the tactics, techniques and procedures used by cyber criminals;
- Describe the principles of confidentiality, integrity, and availability as they relate to data states and cybersecurity countermeasures;
- Describe how technologies, products and procedures are used to ensure integrity.