CY 468 Ethical Hacking

This course covers the tools and techniques that security professionals use to implement, monitor, and evaluate security on computer systems.  Students will lock down and monitor computer systems and gain hands-on experience in collecting information about an organization's vulnerabilities.  Based on their experiences in this course, students will be prepared to conduct penetration testing on authorized systems.

Credits

5

Outcomes

  1. This course will prepare students to:
  2. Understand basic vulnerabilities, threats and risks as it applies to software and hardware.
  3. Understand penetration test and its applications, and the difference between penetrations testing and unethical hacking.
  4. Apply penetration-testing tools to identify a system vulnerability.
  5. Analyze options for enterprise malware detection.
  6. Evaluate the cost of defense, recovery, and remediation for a small organization and a large-scale enterprise.
  7. Create a thorough security analysis of vulnerabilities by using ethical hacking methods.