About this Course:
This course addresses hands-on ethical hacking, penetration testing, detection of malicious probes and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers including the networks themselves, operating systems and important applications. Integrated with the lectures are laboratories focusing on the use of open source and freeware tools; students will learn in a closed environment to probe, penetrate and hack other networks.
- Explain the professional hacker's methodology for attacking a network
- Explain the script kiddie's methodology for attacking network
- Describe and perform covering tracks after gaining access to a network
- Describe the operation of a macro virus
- Specify the general expected characteristics of future super worms
- Explain the concerns of the US. Government with regard to the information infrastructure
- Identify the types and roles of information warfare weapons
- Explain the military, civilian role and law enforcement role in information warfare
Grading/CEU award for this course includes labs and exams.