Train On-Demand
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreThis course covers Vulnerability Assessment. Here in this course, you will learn about technical and nontechnical vulnerabilities, as well as the system for tracking and researching vulnerabilities across the cyber security community. Finding vulnerabilities and researching their criticality, importance, and impact on the client are critical for a cyber security professional. As a pentester, finding and exploiting vulnerabilities to further emulate adversaries is at the heart of the matter. Then reporting and relating to the business is where the value lies.
Instructor for this course
Josh Mason
Security+, CISSP, CTT+, eJPT
Course Introduction
Network-Based Attacks - Part 1
Network-Based Attacks - Part 2
Tshark
Getting Started: Tshark
Filtering Basics
Filtering Basics: HTTP
Arp Poisoning
ARP Poisoning
WiFi Traffic Analysis
WiFi Security: Traffic Analysis I
Filtering WiFi
Filtering Advanced: WiFi
Course Conclusion
Take your technical training into your own hands and stay engaged with our learn-by-doing platform where you can put your skills to the test with hands-on exercises, quizzes, and labs.
Choose the training you want from 18,000+ videos of instructor-led content. Watch anywhere.
Learn MoreINE quizzes, labs, projects, and exercises help reinforce your knowledge.
Learn MoreOrganized training helps guide you through the most relevant subjects for certification prep.
Learn MoreWe add new courses and learning materials to the platform weekly so you're always up-to-date.
Learn MoreIf you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?