Loading...

Course Description

This course prepares students to assess and then correct the vulnerabilities present within information systems. Students learn about tools and penetration testing methodologies used by ethical hackers and discusses what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types." Systems are also investigated.

Prerequisites

None

Equivalents

None

Course Hours

42

Credit Value

3

Applies to the following Programs

Loading...

This course is not open for registration at this time.

If it is part of a program (listed at the bottom left), you may visit the program page to review the schedule of course offerings.

Required fields are indicated by .