Module 1 - Intro to Range and Hacker Methodology
With the increase in cyberattacks that have hit both public and private institutions across the globe in recent years, now, more than ever, the nation is in dire need of talented cybersecurity professionals.
- Module 1 - Intro to Range and Hacker Methodology
- Module 2 - Knowing Normal: Recognizing Traffic Patterns
- Module 3 - Traffic Shaping and Manipulation
- Module 4 - Logging and Monitoring
- Module 5 - Windows Hosts
- Module 6 - Linux Hosts
- Modules 7 and 8 coming soon!