Training Duration (Days)
- Physical classroom & Online
By the end of this course, you will be able to:
- Perform footprinting and reconnaissance using the latest footprinting techniques
- Network scanning techniques and scanning countermeasures.
- Enumeration techniques and enumeration countermeasures
- Vulnerability analysis to identify security loopholes in the organization
- System hacking methodology, steganography, steganalysis attacks, and covering tracks