Throughout the 5-day training, participants practically address the point of view of cyber attackers, the tools and techniques they use. At the end of this period, it is aimed to gain the knowledge and skills to detect and exploit the vulnerabilities of systems, networks and applications.
Delegates will learn
- Introduction to Ethical Hacking
- Gathering Information
- Vulnerability Detection
- System Security
- Network Security
- Threat Analysis and Risk Management
- Application Security
- Social Engineering Attacks