![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to implement continuous offense to measure and monitor cybersecurity defenses. The course covers topics such as Metasploit, Wannacry, vulnerability assessment, breach attack simulation tools, sandboxing, Kali Linux, Powershell, endpoint tools, frequency vulnerability assessment, malware polymorphism, continuous testing, machine learning, and simulation. The teaching method includes hands-on labs, examples, and practical tools. This course is intended for security specialists, decision makers, entrepreneurs, developers, and anyone interested in enhancing their cybersecurity skills and knowledge.
Syllabus
Introduction
Welcome
Personal Background
Metasploit
Wannacry
Awareness
Who would hack your network
Prevention capabilities are not good
Know whats in your network
We can all do this
Lab to test
Lack of measurement
Maturity levels
Vulnerability assessment
The solution of security
Breach attack simulation tools
Where to practice
Hacking Yourself
Example
Sandboxing
Testing
Kali Linux
Powershell
Organization
Tools
Endpoint
Frequency Vulnerability Assessment
Malware Polymorphism
Continuous Testing
Machine Learning
Simulation
Summary
Optimization
Questions
Taught by
DefCamp