Cracking & Securing Password-Protected Data: Gain experience with password cracking strategies, and write a report suggesting technical, governance, and UX policies effective for minimizing vulnerability to such attacks.
Then, summarize the site’s vulnerabilities with policy recommendations.
Attacking a Web Application: Explore, attack, and profile a vulnerable website with tools like Burp Suite.
Network Security Monitoring & Logging: Analyze log data, identify and characterize intrusion evident from the data, and perform incident response.
Network Analysis & Troubleshooting: Monitor the packets being transmitted over a network to gain insight into problems such as dropped packets and explore other patterns apparent only at the packet-level.
By the time you complete the Cybersecurity Boot Camp, you will be able to do: