This course provides a flexible methodology for use in emulating external and internal network intrusion threat vectors.
Although no specific courses are required, students should have some level of experience with Microsoft Windows and Linux operating systems as well as a basic understanding of TCP/IP networking.
4. Web Hacking
5. System Hacking (Windows)
6. System Hacking (Unix)