Real-World Systems: Security Architecture, Domains & Ethical Hacking Practicum

collapse

Course Details

This course can only be taken as part of the Certificate in Ethical Hacking.

Get Program Details

About this Course


This course continues with a combination of instructor-led presentations and directed exploratory learning in a virtual environment. We’ll cover advanced topics relevant to Linux and Windows enterprise environments. The course will culminate in a capture-the-flag challenge where you’ll practice and demonstrate the skills you’ve learned throughout the entire program by compromising a realistic network environment.

What You'll Learn 

  • How to perform reconnaissance, gain initial access and apply post-exploitation techniques during a capture-the-flag exercise 
  • The major components of cloud technologies, cloud-native application design flaws and elevation-of-privilege issues
  • How to apply threat modeling techniques to cloud-hosted applications and micro-services architectures
  • How to uncover cloud resource misconfigurations, exploit them and determine their impact 

Get Hands-On Experience

After you complete the capture-the-flag project, you’ll compile a report of your findings that details commonly encountered IT services.

digital badge example

EARN A DIGITAL BADGE

After successfully completing this course, you can claim a digital achievement badge. Learn about digital badges.

  Get our email newsletter with career tips, event invites and upcoming program info.       Sign Up Now