Course Overview
Learn how attacks are executed through case studies and protocol analysis, gain deep understanding of the attacker’s mind set, and design defense strategies that strike at the core of DNS-based exploits and tactics.
This training course is intended for professionals working or intending to work in the information security area.
Who should attend
This course is ideal for Cyber Security Specialists, Security Analysts, Security Engineers, Security Operations Manager, and Security Architects.
Prerequisites
Basic networking, No DNS knowledge required.