Ethical Hacking and Penetration Testing
Learning Outcomes
Upon successful completion of this course, students are expected to be able to: Apply the principles of penetration testing; Identify various method of gathering information to launch an attack; Explain and apply principles of ethical hacking for professional responsibilities; and Analyze the impact of a vulnerability to the security of the stakeholders.
Topics
This course prepares student to perform offensive security for the purpose of penetration testing. It introduces hacking tools, techniques, and the theory behind how the tools are used and where they work. The materials follow ethical hacking steps such as footprinting, enumeration, system hacking, escalating privilege, and covering tracks. Areas of instruction include setting up a lab to act as a victim, understanding vulnerabilities of operating systems, using various tools used by hackers to access unauthorized information. The course includes hands-on lab on attacking and defending the systems and network.
Prerequisite : CS213 – Data Communications and Networks
Published at :
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...