Courses
Select a Course:
Course Description
This course is a survey of the ethical and legal issues pertaining to security testing. It demonstrates how to use tools that can be used to gain information about a computer network, how to recognize that the tools are being used, and how to defend a network against those attacks.
By successfully completing this course you will earn 3 units of college credit.
⇑ Table of Contents
Course Objectives
-
Describe the role of an ethical hacker.
-
Test a data communications network for security vulnerabilities.
-
Compose a certifiable security report.
-
Compare port scanning tools for viability.
-
Enumerate Windows OS targets and services.
-
Develop custom software applications for security testing purposes.
-
Analyze authentication processes for security vulnerabilities.
-
Compare symmetric and asymmetric encryption algorithms.
-
Describe intrusion detection and prevention systems and Web-filtering technologies.
⇑ Table of Contents
Course Learning Outcomes
⇑ Table of Contents