During this 5-day lab-intensive course, candidates will be immersed in an interactive environment where they will learn how perimeter defenses work and then be lead into scanning and attacking their own networks.No real network is harmed.
During this 5-day lab-intensive course, candidates will be immersed in an interactive environment where they will learn how perimeter defenses work and then be lead into scanning and attacking their own networks.No real network is harmed.
Students then learn how intruders escalate privileges and what steps can be taken to secure a system.
Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.
Curriculum:
Historically, the school’s focus has been toward the adult learner who desires to change careers and is looking for a school that can accommodate their special needs.
The training strategy has been and is to teach these “career changers” the basics of networking and PC repair before they go on to Microsoft and/or Cisco courses. By approaching training in this manner.
The Code Academy ensures that the student has a solid foundation in the networking field and thus is able to apply what they are learning to an actual network.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy