Description
Size: 326 MB
Pre-requisites
- Networking
- Protocols
- Operating systems
- Security devices
This training course is for…
- SOC Analysts
- CSIRT Members
- Incident Handlers
- Incident Responders
- Red Team members who want to understand blue team tactics and deliver stealthier penetration tests
- IT Security Personnel in charge of defending their organization’s assets