In this hands-on course, students learn to think like attackers to identify vulnerabilities before malicious actors can exploit them. They practice reconnaissance, vulnerability scanning, exploitation techniques, and the safe use of testing tools. Ethical guidelines, scoping agreements, and reporting findings are integral parts of the curriculum. Students emerge with a structured methodology for uncovering system flaws and providing recommendations to strengthen defensive measures.
Prerequisite Courses