PARTICIPANTS LEARN:
- The basics of setting up and administering both Windows and Linux operating systems
- Hardening techniques for securing both Windows and Linux hosts
- What tools attackers commonly use to perform reconnaissance on their targets
- How and why attackers perform password cracking, network sniffing, and other attacks
- The tools defenders typically utilize to defend their systems and respond to incidents
Interested participants sign up here: http://maui.hawaii.edu/cybersecurity/gencyber/