• Online, Self-Paced
Course Description

Discusses the tools and techniques used to look for weaknesses and vulnerabilities in a lawful and legitimate manner, along with the tools and techniques to strengthen security of systems. Discusses network mapping, cloud security, scripting, basic IETF protocols and analyze how they work and how they have been exploited.

Learning Objectives

The learning objectives are to identify the history of information technology hacking and penetration testing, identify the ethical standards and laws applicable to penetration testing, identify the impact of information technology by malicious and profit driven hacks on society, and apply conventional hacking techniques through a wide variety of technical tools to identify weaknesses in information systems.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.