6 April 2019
In this hands-on workshop, we will follow the steps of an attack from a red team perspective and consider how to remediate the actions for each phase from a blue team perspective.
Objectives – What You Will Leave Knowing
Knowledge of the five phases of an attack: Recon, Scanning, Gaining Access, Maintaining Access, Covering Tracks.
How to use Kali Linux to gain access to a remote host.
How to defend against certain types of attacks.
Knowledge related to the EC-Council CEH certification.
Knowledge related to the CompTIA PenTest+ certification