TRAINING

Stage 5 Testing and Protection of Cybersecurity Vulnerabilities

At the fifth stage of the CIC training, key concepts of penetration testing and investigations in ethical hacking will be explored. Moreover, black hat hackers and their practices will be discussed as well. Students are expected to comply with computer ethics when completing any and all hands-on activities/assignments in class. Vulnerability scanning, data capturing, penetration testing, and configuration of advanced cybersecurity systems will be discussed.




START YOUR PAGE

Center for Cybercrime Investigation
and Cybersecurity

Director : Kyung-Shick Choi
Main Office : 46 Warren Ave, Milton, MA 02186

Training Center : 1010 Commonwealth Ave. Room 515 Boston, Massachusetts 02215

TEL :  617-358-2807  |  FAX : 617-358-3595
EMAIL : admin@centercicboston.org


Copyright 2018 Center for CIC | Resource Guide for Global Cybersecurity Research & Training | All Rights Reserved |
Privacy at Center for CIC

CONTACT US

admin@centercicboston.org

Center for Cybercrime Investigation and Cybersecurity

Director : Kyung-Shick Choi  |  Main Office : 46 Warren Ave, Milton, MA 02186
Training Center : 1010 Commonwealth Ave. Room 515 Boston, Massachusetts 02215

TEL :  617-358-2807  |  FAX : 617-358-3595  |  EMAIL : admin@centercicboston.org


Copyright 2018 Center for CIC  | Resource Guide for Global Cybersecurity Research & Training | All Rights Reserved
Privacy at Center for CIC

CONTACT US

admin@centercicboston.org