This course asks you to consider the ways in which your systems may be at risk. We’ll discuss discovery and attack vectors as well as defensive measures to guard against breaches. Discovery is often one the first stages in hacking activity. The idea of discovery is to find out about what information is already out and available for use. An attack vector is simply a pathway, or a method, by which an attack can reach you. You will consider what attack vectors are you at risk of having used against you. Once you understand the threats you face, you can begin to take defensive action.
Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices
Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Linux)
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.