Performing Network Reconnaissance and Vulnerability Scanning.Installing, Using, and Blocking a Malware-based Backdoor.Auditing Passwords with a Password Cracking Utility.Analyzing the Results of a Credentialed Vulnerability Scan.Intercepting and Interpreting Network Traffic with Packet Sniffing.Completing essential cybersecurity reading and assignments to familiarize yourself with the framework and foundations of cybersecurity.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |