-
Use virtualization as it applies to penetration testing.
-
Discover, scan and exploit network vulnerabilities.
-
Demonstrate the ability to perform an entry level penetration test.
-
Hack and secure wired networks
-
Hack secure systems using client-side and social engineering attacks
-
Create a virtual install of Kali Linux
Ethical Hacking – Hands-On Training – Part I
