Partie 1
Identify Weaknesses and Attack Targets in the Windows Environment
Partie 2
Exploit Attack Paths in Your Windows Environment
Partie 3
Protect and Monitor Your Windows Environment
Partie 1
Identify Weaknesses and Attack Targets in the Windows Environment
Partie 2
Exploit Attack Paths in Your Windows Environment
Partie 3
Protect and Monitor Your Windows Environment
Identify Weaknesses and Attack Targets in the Windows Environment