Second of two courses that provide an understanding of how to effectively protect computer networks. Students will continue to learn the tools and penetration testing methodologies used by ethical hackers. Students will practice post-exploitation, cryptography, hardening OSs, and wireless security. Also covered is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. This second of two courses is designed for those interested in systems and application security or those who want to take the EC-Council's Certified Ethical Hacker (CEH) exam (312-50) 2 lecture/2 lab hours.
Information & Engineering Tech