Learn the attacker’s methodology and start your career in cybersecurity, penetration testing, and ethical hacking!
What Will I Learn?
Understand the steps of a cyber attack
Understand the basic methodology, tools, and techniques used by hackers in exploiting networks and information systems
Requirements
PC or Mac with at least 4 GB of RAM in order to install the virtualization software used in this course
Windows XP disc or disc image to setup a vulnerable machine for the labs
Kali Linux disc image (free to download, instructions provided in the course)
VirtualBox software (free to download, instructions provided in the course)