Provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Students will learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Students will practice footprinting, scanning, enumeration, exploitation, and post-exploitation. Also covered is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. This course is designed for those interested in systems and application security or who want to take the EC-Council's Certified Ethical Hacker (CEH) exam (312-50).
Information & Engineering Tech