CNIT

XML and JSON

Introduction to eXtensible Markup Language (XML) and JavaScript Object Notation (JSON). Hands-on experience with XML documents, Document Type Definition (DTD), namespaces, schemas, and data presentation with eXtensible Style Language (XSLT) or Cascading Style Sheets (CSS). Introduction to JSON syntax to store and exchange data.

Internet Basics and Beginning HTML

Students become critical participants on the Internet and World Wide Web, analyzing methods of using the Internet, and its history, technical underpinnings, and protocols. Create Web content and learn skills for effective online communication through technologies and tools, including electronic mail, connecting to remote computers, file transfer, and the World Wide Web. Delve into the complex worlds of computer security, copyright, electronic commerce, and artificial intelligence as it is implemented in modern Internet tools.

Securing Web Applications

This course teaches techniques used by attackers to breach Web applications and how to prevent security attacks. Topics include how to secure and manage assets such as authentication systems, access controls, databases, and back-end components, and how to protect users from attackers, including identifying common vulnerabilities in compiled code and source code.

Hacking Mobile Devices

Mobile devices run specialized operating systems with security problems. Students will learn how mobile operating systems and apps work, how to find and exploit vulnerabilities and how to defend them. Topics will include phone call, voicemail, SMS intrusion, jailbreaking, rooting, NFC attacks, mal ware, browser exploitation, and application vulnerabilities.

Exploit Development

Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems. Covers essential exploit development skills for advanced penetration testers and security professionals. Students will be required to obey high ethical principles and not exploit systems without authorization.

Information Security Professional Practices

In-depth course in information security, including access control, application security, enterprise continuity, cryptography, technical risk management, physical security, and telecommunications and network security. This course supports preparation for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals.

Advanced Ethical Hacking

Advanced techniques in ethical hacking of Windows and Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, web servers, and Denial of Service attacks.

Ethical Hacking & Network Defense

Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.