CEH
Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks via virtual labs. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.