Read our cookies policy and privacy statement for more information.
×Johnson City, Tennessee
Introduces how to scan, test, hack and secure computer systems and networks. It addresses how perimeter defenses work and how to scan and attack networks without harming them. It shows how intruders escalate privileges and how to secure a system. It also explains intrusion detection, policy creation, social engineering, DDoS Attacks, buffer overflows, and virus creation.
Units: 3.0