Description
To defend against hackers, you need to think like a hacker. This course covers the fundamentals of ethical hacking, from Linux commands and open-source tools to attack tree construction and vulnerability research. By the end of the course, you'll be able to use what you’ve learned to analyze, interpret, and communicate penetration tests and security strategies to executives.