This course will provide students with practice and skill-building exercises required to identify and document security vulnerabilities. The student will learn penetration testing in a lab environment using ethical principles to secure a computer data environment. Upon completion students will be able to provide an in-depth understanding of secure communications channels, devices and media.
Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements. Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system. Compare and contrast different hacking techniques and analyze the legal implications of hacking. Examine different vulnerabilities, threats and attacks to information systems and recommend countermeasures. Compare and contrast various network security assessment and hacking tools. Assess various network security techniques and tools and implement appropriate level of information security controls based on evidence, information, and research.