Attacks and Exploits
Description
Program Objectives
- Research attack vectors and perform network attacks
- Research attack vectors and perform wireless attacks
- Research attack vectors and perform application-based attacks
- Research attack vectors and perform attacks on cloud technologies
- Explain common attacks and vulnerabilities against specialized systems
- Perform a social engineering or physical attack.
- Perform post-exploitation techniques.
Topics for this course
14 Lessons
Attacks and Exploits
Program Objectives
Research attack vectors and perform network attacks
Research attack vectors and perform wireless attacks
Research attack vectors and perform application-based attacks
Research attack vectors and perform attacks on cloud technologies
Explain common attacks and vulnerabilities against specialized systems
Perform a social engineering or physical attack.
Perform post-exploitation techniques.