Read our cookies policy and privacy statement for more information.
×Highland Heights, Kentucky
Study phases of cyber-attacks and different techniques used for hacking operating systems, servers, networks and applications. Gather information for ethical hacking and be able to use tools to perform vulnerability assessment and penetration testing. Identify countermeasures to host-based, network/web-based and malware attacks
Units: 3.0
Hours: 3 classroom + 0 lab/studio