Develop knowledge of an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You'll cover topics including intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation.
Develop the expertise to plan, design and implement an effective program to protect SCADA systems. You'll gain an understanding of common Industrial Control Systems (ICS) threats, vulnerabilities and risks, and how they can be managed.
Get hands-on lab experience and learn about the tools used by real attackers. You will have the opportunity to scan, test, hack and secure your own system so you can go away and improve the resilience of your organization.