First of two courses that provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Students will review TCP/IP concepts and learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Students will practice footprinting, scanning, enumeration, exploitation, and social engineering. This first of two courses is designed for those interested in systems and application security or who want to take the EC-Council's Certified Ethical Hacker (CEH) exam (312-50).
Information & Engineering Tech