What Skills Will You Learn?
Explain the importance of planning and key aspects of compliance-based assessments
Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks, and perform post-exploitation techniques
Conduct information gathering exercises with various tools and analyze output and basic scripts (limited to: Bash, Python, Ruby, PowerShell)
Utilize report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities