Students will begin by understanding how perimeter defenses work and then be led into scanning and attacking their own networks, no real network is harmed; how intruders escalate privileges and what steps can be taken to secure a system; Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.