CY 468 Ethical Hacking

This course covers the tools and techniques that security professionals use to implement, monitor, and evaluate security on computer systems.  Students will lock down and monitor computer systems and gain hands-on experience in collecting information about an organization's vulnerabilities.  Based on their experiences in this course, students will be prepared to conduct penetration testing on authorized systems.

Credits

5

Prerequisite

For students to succeed in this course, IS 345 and IS 471 are required pre-requisites.

Outcomes

  1. This course will prepare students to:
  2. 1. Understand basic vulnerabilities, threats and risks as it applies to software and hardware.
  3. 2. Understand penetration test and its applications, and the difference between penetrations testing and unethical hacking.
  4. 3. Apply penetration-testing tools to identify a system vulnerability.
  5. 4. Analyze options for enterprise malware detection.
  6. 5. Evaluate the cost of defense, recovery, and remediation for a small organization and a large-scale enterprise.
  7. 6. Create a thorough security analysis of vulnerabilities by using ethical hacking methods.