Cost: $999
Brochure Registration
What you will learn: The four step process: information gathering, scanning, exploitation, and post exploitation, How attackers leverage the web, Post scanning, fingerprinting, and versioning techniques, Vulnerability scanning with Nessus, Exploitation and privilege escalation utilizing John the Ripper, Exploitation with Metasploit, Exploiting the human by “hacking” users, Post exploitation and meterprete.