About this Course
This course continues with a combination of instructor-led presentations and directed exploratory learning in a virtual environment. We’ll cover advanced topics relevant to Linux and Windows enterprise environments. The course will culminate in a capture-the-flag challenge where you’ll practice and demonstrate the skills you’ve learned throughout the entire program by compromising a realistic network environment.
What You'll Learn
- How to perform reconnaissance, gain initial access and apply post-exploitation techniques during a capture-the-flag exercise
- The major components of cloud technologies, cloud-native application design flaws and elevation-of-privilege issues
- How to apply threat modeling techniques to cloud-hosted applications and micro-services architectures
- How to uncover cloud resource misconfigurations, exploit them and determine their impact
Get Hands-On Experience
After you complete the capture-the-flag project, you’ll compile a report of your findings that details commonly encountered IT services.
EARN A DIGITAL BADGE
After successfully completing this course, you can claim a digital achievement badge. Learn about digital badges.