CNIT 123 Ethical Hacking and Network Defense (3)
Credit, Degree Applicable
Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Learn about attacks and how to defend Windows and Linux systems.
After successful completion of this course, students will be able to:
- Outcome 1: Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers.
- Outcome 2: Perform reconnaissance on a target network using a variety of scanning and probing techniques.
- Outcome 3: Enumerate and classify Microsoft and Linux Operating Systems vulnerabilities.
- Outcome 4: Take control of Web Servers and wireless networks, and protect them.
- Outcome 5: Evaluate and select cryptography and hashing methods, and perform attacks against them.
- Outcome 6: Select and implement security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.