• Online, Self-Paced
Course Description

Discusses the tools and techniques used to look for weaknesses and vulnerabilities in a lawful and legitimate manner, along with the tools and techniques to strengthen security of systems. Discusses network mapping, cloud security, scripting, basic IETF protocols and analyze how they work and how they have been exploited.

Learning Objectives

The learning objectives are to identify the history of information technology hacking and penetration testing, identify the ethical standards and laws applicable to penetration testing, identify the impact of information technology by malicious and profit driven hacks on society, and apply conventional hacking techniques through a wide variety of technical tools to identify weaknesses in information systems.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.