• Classroom
  • Online, Instructor-Led
Course Description

This course provides knowledge and skills related to activities behind hacking attacks and countermeasures. Coursework helps students build defense mechanisms to protect applications, systems and networks from hackers. Security loopholes, as well as common attack tools used by black hat hackers, are examined.

Learning Objectives

  1. Given the description of an established organization and its fully deployed information systems, examine how to leverage the freely available tool sets to build a test environment to evaluate the strength of its security infrastructure.
  2. Given the layout of an organization’s networks and its hardware and software components, evaluate where the networks are most vulnerable.
  3. Given the description of an established organization and its data infrastructure, perform tests to evaluate the vulnerabilities of the infrastructure and develop mitigation strategies to lower/eliminate risks to an acceptable level.
  4. Given the description of an established organization and its data infrastructure, assess the vulnerabilities as it relates its gateway to the Internet.
  5. Given the description of an established organization and its data infrastructure, investigate all risks associated with its data assets.
  6. Given the description of an established organization and its data infrastructure, develop continuous process improvements to counter-attack new tools and strategies that allow hackers to penetrate an organization data infrastructure.
  7. Given the description of an established organization and its infrastructure, explain how you would execute a pen test.
  8. Given the description of an established organization and its resources, evaluate the ethical and legal implications of performing white hat activities.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Training, Education, and Awareness
  • Strategic Planning and Policy
  • Systems Development
  • Systems Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.