Course Discription |
:
Introduction to the principles and techniques associated with the cybersecurity practice known as
ethical hacking. The course covers planning, reconnaissance, scanning, exploitation, postexploitation, and result reporting. The student discovers how system vulnerabilities can be
exploited and learns to avoid such problems. The course will provide the fundamental information
associated with each of the methods employed and insecurities identified. In all cases, remedial
techniques will be explored. Students will develop an excellent understanding of current
cybersecurity issues and ways that user, administrator, and programmer errors can lead to
exploitable insecurities. |