-
Review the core principles and concepts of ethical hacking
-
Perform key pre-attack tasks, including reconnaissance and
footprinting
-
Master enumeration, vulnerability scanning, and vulnerability analysis
-
Learn system hacking methodologies, how to cover your tracks, and more
-
Utilize modern malware threats, including ransomware and financial
malware
-
Exploit packet sniffing and social engineering
-
Master denial of service and session hacking attacks, tools, and
countermeasures
-
Evade security measures, including IDS, firewalls, and honeypots
-
Hack web servers and applications, and perform SQL injection attacks
-
Compromise wireless and mobile systems, from wireless encryption to
recent Android exploits
-
Hack Internet of Things (IoT) and Operational Technology (OT) devices
and systems
-
Attack cloud computing systems, misconfigurations, and containers
-
Use cryptanalysis tools and attack cryptographic systems