Skip to content

Details

  • Understanding and performing recon on the target network using port scanning tools.
  • Identifying potential and critical targets to exploit.
  • Connecting the dots to complete the attack chain: Exploiting DNS.
  • Detecting such attacks using a holistic SIEM solution.
Network Security
System Administration
Information Security
ITIL ITSM
Help Desk

Members are also interested in