Close Menu

Vulnerability Analysis & Control, IT-S 843

About this Course: 

This course addresses hands-on ethical hacking, penetration testing, detection of malicious probes and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers including the networks themselves, operating systems and important applications. Integrated with the lectures are laboratories focusing on the use of open source and freeware tools; students will learn in a closed environment to probe, penetrate and hack other networks.


IT-O 840 Network+ Certification Training or equivalent experience. It is recommended, but not required, that students also take IT-S 848 Cyber Security Technologies prior to or in parallel with this course.

Course Outline: 

Cyber Law Ethics
Introduction to Vulnerability Analysis Reconnaissance
Introduction to Scanning
Programming Survival Skills
Exploit Basics
Flooding and ARP spoofing
SQL Injection
Cross Site Scripting and Forgery
Password Cracking

Expected Outcomes: 

  • Explain the professional hacker's methodology for attacking a network
  • Explain the script kiddie's methodology for attacking network
  • Describe and perform covering tracks after gaining access to a network
  • Describe the operation of a macro virus
  • Specify the general expected characteristics of future super worms
  • Explain the concerns of the US. Government with regard to the information infrastructure
  • Identify the types and roles of information warfare weapons
  • Explain the military, civilian role and law enforcement role in information warfare

Grading Details: 

Grading/CEU award for this course includes labs and exams.