This course will examine various hacking tools used to exploit networks and sites. It will teach students to examine the patterns of an attack and how to respond in the event of an attack. It will also examine tools and techniques used to mitigate attacks. Fundamental to the securing of any system is understanding the types of attacks that can be successful against that system. By learning to use exploitation tools, learners will better understand how to protect against them. This course works in conjunction with Network Monitoring & Penetration Testing to develop a strong foundation in recognizing when a network attack is taking place and being able to contain and prevent any damage that might occur.