Upon successful completion of this course, students are expected to be able to apply the principles of penetration testing; identify various methods of gathering information to launch an attack; apply the principles of ethical hacking for professional responsibilities; and analyze the impact of a vulnerability to the security of the stakeholders.
This course prepares students to perform offensive security for the purpose of penetration testing. It introduces hacking tools, techniques, and the theories behind how the tools are used and where they work. The materials follow ethical hacking steps such as foot printing, enumeration, system hacking, escalating privilege, and covering tracks. Areas of instruction include setting up a lab to act as a victim, understanding the vulnerabilities of operating systems, and using various tools used by hackers to access unauthorized information. The course includes a hands-on lab on attacking and defending the systems and network.
Published at : Updated