Discusses the tools and techniques used to look for weaknesses and vulnerabilities in a lawful and legitimate manner, along with the tools and techniques to strengthen security of systems. Discusses network mapping, cloud security, scripting, basic IETF protocols and analyze how they work and how they have been exploited.
Learning Objectives
The learning objectives are to identify the history of information technology hacking and penetration testing, identify the ethical standards and laws applicable to penetration testing, identify the impact of information technology by malicious and profit driven hacks on society, and apply conventional hacking techniques through a wide variety of technical tools to identify weaknesses in information systems.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.