Ethical Hacking Basics

Evading IDS, Firewalls and Honeypots

Footprinting and Reconnaissance


Hacking Mobile Platforms

Hacking Wireless Networks

ICS Components and Protocols

Identity and Access Management

Implement Active Directory Certificate Services (AD CS) (MCSA 2016)

Implement an advanced network infrastructure (MCSA 2016)

Implement DHCP (MCSA 2016)

Implement Domain Name System (DNS) (MCSA 2016)

Implement high availability (MCSA 2016)