At the end of this course, participants will be able to:
Learn to use a set of modern software tools to perform various PenTest tasks on computer hosts and enterprise networks;
Implement appropriate defense mechanisms to mitigate and remediate the identified issues;
- Understand families of attacks and flaws that lead to vulnerabilities;
- Identify and properly utilize modern-day penetration testing tools such as NMAP, Nessus, Metasploit, and Social Engineer Toolkit (SET);
- Perform ethical hacking to identify host and network vulnerabilities.