In our technology-centric world, as the world gets more connected, it also gets less safe. Cybersecurity is one of the fastest growing and in-demand professions. Individuals in this field perform a wide variety of jobs including but not limited to consultation, investigation and program management services to mitigate risks through both internal and external sources. Cybersecurity professionals are required to evaluate, design and implement security plans, conduct in-depth fraud investigation and perform security research and risk assessment and propose solutions to potential security breaches.
If you want to become a "defender", go to the CyberSecurity Operations course from Cisco Networking Academy
Ethical Hacking Statement
The Cisco Networking Academy Program is focused on creating the global problem solvers needed to build, scale, secure, and defend the networks that are used in our businesses and daily lives. The need for well-trained cybersecurity specialists continues to grow at an exponential rate. Training to become a cybersecurity specialist requires in depth understanding and exposure to how cyber attacks occur, as well as how they are detected and prevented. These skills will naturally also include learning the techniques that threat actors use to circumvent data, privacy, and computer and network security.
In this course, learners will use tools and techniques in a “sandboxed”, virtual machine environment that allows them to create, implement, monitor, and detect various types of cyber attacks. The hands-on training is performed in this environment so that students can gain the necessary skills and knowledge needed to thwart these and future cyber attacks. Security holes and vulnerabilities that are created in this course should only be used in an ethical manner and only in this “sandboxed” virtual environment. Experimentation with these tools, techniques, and resources outside of the provided sandboxed virtual environment is at the discretion of the instructor and local institution. If the learner has any doubt about which computer systems and networks are part of the sandboxed virtual environment, they should contact their instructor prior to any experimentation.
Unauthorized access to data, computer, and network systems is a crime in many jurisdictions and often is accompanied by severe consequences, regardless of the perpetrator’s motivations. It is the learner’s responsibility, as the user of this material, to be cognizant of and compliant with computer use laws.
More information: email to <email@example.com>