( 8 Hours Per Day )
- Perform brute force checks on remote authentication
- Observe and track network traffic and use a simple IDS and
- Perform internal and external vulnerability assessments on a
- Assess the security of their wireless environment.
- Understand how to generate a malicious payload, and what to
look for to detect them.
Students must have a basic knowledge of networking,
packets and ideally some experience with the command
Run in partnership with Cyber Toa - Cyber Security