Options d’inscription

Phases of a cyber-attack: reconnaissance, scanning, exploitation of faults and obtaining access, maintaining access, covering traces. Tools and hacking techniques used in cyber-attacks. Case Analysis of Cyber Attacks. Planning intrusion tests and considering legal aspects. Simulation of a cyberattack.
Les visiteurs anonymes ne peuvent pas accéder à ce cours. Veuillez vous connecter.