Catalog Description:

This course focuses on the complete cycle of enterprise security from identifying vulnerabilities, detecting application exploitation and post exploitation mitigations and analysis for an enterprise level cyber infrastructure.

Last Offered:

First Offering

Anticipated Offering(s) - Subject to change:

TBD