Curriculum
- 1 Section
- 16 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Attacks and Exploits16
- 1.1Research attack vectors and perform network attacks Part 1.22 Minutes
- 1.2Research attack vectors and perform wireless attacks Part 1.33 Minutes
- 1.3Research attack vectors and perform application-based attacks Part 1.17 Minutes
- 1.4Research attack vectors and perform attacks on cloud technologies Part 1.32 Minutes
- 1.5Explain common attacks and vulnerabilities against specialized systems Part 1.30 Minutes
- 1.6Perform a social engineering or physical attack.31 Minutes
- 1.7Perform post-exploitation techniques Part 1.33 Minutes
- 1.8Research attack vectors and perform wireless attacks Part 2.29 Minutes
- 1.9Research attack vectors and perform application-based attacks Part 2.31 Minutes
- 1.10Research attack vectors and perform application-based attacks Part 3.31 Minutes
- 1.11Research attack vectors and perform attacks on cloud technologies Part 2.23 Minutes
- 1.12Explain common attacks and vulnerabilities against specialized systems Part 2.31 Minutes
- 1.13Explain common attacks and vulnerabilities against specialized systems Part 3.23 Minutes
- 1.14Perform post-exploitation techniques Part 2.21 Minutes
- 1.15Research attack vectors and perform network attacks Part 2.23 Minutes
- 1.16Research attack vectors and perform application-based attacks Part 4.21 Minutes