Catalog Description:
This course focuses on the complete cycle of enterprise security from identifying vulnerabilities, detecting application exploitation and post exploitation mitigations and analysis for an enterprise level cyber infrastructure.
Last Offered:
First Offering
Anticipated Offering(s) - Subject to change:
TBD