Discusses the tools and techniques used to look for weaknesses and vulnerabilities in a lawful and legitimate manner, along with the tools and techniques to strengthen security of systems. Discusses network mapping, cloud security, scripting, basic IETF protocols and analyze how they work and how they have been exploited.
Learning Objectives
The learning objectives are to identify the history of information technology hacking and penetration testing, identify the ethical standards and laws applicable to penetration testing, identify the impact of information technology by malicious and profit driven hacks on society, and apply conventional hacking techniques through a wide variety of technical tools to identify weaknesses in information systems.
Framework Connections
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.