The course covers the methodologies and tools required to assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. It focuses on the most advanced tools and techniques used by black and grey hat hackers alike to break into an organization to assess, document, and remediate vulnerabilities from a vendor-neutral perspective. This course directly maps to the EC-Council Certified Ethical Hacker (CEH) certification. The course requires the mandatory use of electronic labs as a textbook fee.