• Classroom
  • Online, Instructor-Led
Course Description

This course provides knowledge and skills related to activities behind hacking attacks and countermeasures. Coursework helps students build defense mechanisms to protect applications, systems and networks from hackers. Security loopholes, as well as common attack tools used by black hat hackers, are examined.

Learning Objectives

  1. Given the description of an established organization and its fully deployed information systems, examine how to leverage the freely available tool sets to build a test environment to evaluate the strength of its security infrastructure.
  2. Given the layout of an organization’s networks and its hardware and software components, evaluate where the networks are most vulnerable.
  3. Given the description of an established organization and its data infrastructure, perform tests to evaluate the vulnerabilities of the infrastructure and develop mitigation strategies to lower/eliminate risks to an acceptable level.
  4. Given the description of an established organization and its data infrastructure, assess the vulnerabilities as it relates its gateway to the Internet.
  5. Given the description of an established organization and its data infrastructure, investigate all risks associated with its data assets.
  6. Given the description of an established organization and its data infrastructure, develop continuous process improvements to counter-attack new tools and strategies that allow hackers to penetrate an organization data infrastructure.
  7. Given the description of an established organization and its infrastructure, explain how you would execute a pen test.
  8. Given the description of an established organization and its resources, evaluate the ethical and legal implications of performing white hat activities.

Framework Connections

Specialty Areas

  • Training, Education, and Awareness
  • Strategic Planning and Policy
  • Systems Development
  • Systems Analysis