Ask for a report following the hacking training is done that includes the techniques the hacker used with your devices, the vulnerabilities they uncovered as well as their advised techniques to repair These vulnerabilities. Once you've deployed fixes, have the hacker check out the attacks once more to be certain https://trustedhackers.org/