Provides an in-depth investigation of threat actors and the techniques they employ to attack networks. This course covers threat capabilities and objectives. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintaining access, and reporting is examined.
Cyber Threat Intelligence
CNG
4010