Develop knowledge of an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You'll cover topics including intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation.
Develop the expertise to plan, design and implement an effective program to protect SCADA systems. You'll gain an understanding of common Industrial Control Systems (ICS) threats, vulnerabilities and risks, and how they can be managed.
Get hands-on lab experience and learn about the tools used by real attackers. You will have the opportunity to scan, test, hack and secure your own system so you can go away and improve the resilience of your organization.
Learn about the most common insecurities and vulnerabilities within mobile applications, how to identify them and how to use secure design and development best practices to eliminate risks. This course will give you the confidence to reduce the risk of mobile applications for your business.