This course covers the major issues surrounding the use of penetration testing to secure network security and important skills of a professional hacker and common security challenges that an information security officer will face in his/her work.
Topics include the ethics of ethical hacking, laws and regulations, vulnerability discovery and risk analysis, internal and external attacks, how malicious hackers attack and exploit system vulnerabilities, penetration testing methods and tools, latest security countermeasures, and various types of penetration testing and programming skills required to complete successful penetration tests and to secure real systems against real attacks.
Offered fully online or hybrid (1 lecture/week), 3 Credit hours. Instructor led.
Learning Objectives
- Differentiate what an ethical hacker can and cannot do legally.
- Evaluate security threats and vulnerabilities.
- Use hacking tools to locate and fix security leaks.
- Assess potential operating systems vulnerabilities.
- Compare different crypto algorithms.
- Manage and configure network security devices to secure real systems against real attacks.
- In depth knowledge of at least one network security topic.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis
- Exploitation Analysis
- Systems Analysis
- Targets
- Technology R&D
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.