Network Scans

Students learn to use a computer network to gather information regarding computing systems for security assessment, system maintenance, simulated security hacks.

Vulnerability Exploitation

Students learn to identify and repair weaknesses that may be an be exploited by a cyber attacker.

Penetration Testing

Students explore ethical hacking by testing systems and networks to find security vulnerabilities.

Kali Linux

Kali Linux contains hundreds of tools designed for information security tasks and training.