This course introduces students to common computer vulnerabilities as well as exploits and techniques used by hackers. Students will develop countermeasures to mitigate attacks and strengthen system security. Topics covered include vulnerability scanning, social engineering, denial of service attacks, intrusion detection, buffer overflow and penetration testing.
Johnson County Community College
12345 College Blvd
Overland Park, KS 66210
IT 150- Switching, Routing and Wireless Essentials and IT 230- Linux Fundamentals
12345 College Blvd
Overland Park, KS 66210
Perform reconnaissance and footprinting procedures to collect information about potential targets.
Describe common social engineering attacks and policies to mitigate them.
Demonstrate password-cracking techniques and develop measures to strengthen passwords.
Deploy Metasploit framework to perform penetration testing on various systems.
Attack web applications using cross-site scripting (XSS), command injection and client-side exploitations.
Perform network analysis using common sniffing tools.
Install backdoors to compromise access privileges and system integrity.
Describe common attacks against cryptographic security measures.
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.