Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. Kennesaw State University
  4. IT 6843: Ethical Hacking: Network Security and Penetration Testing

IT 6843: Ethical Hacking: Network Security and Penetration Testing

This course covers the major issues surrounding the use of penetration testing to secure network security and important skills of a professional hacker and common security challenges that an information security officer will face in his/her work.

Topics include the ethics of ethical hacking, laws and regulations, vulnerability discovery and risk analysis, internal and external attacks, how malicious hackers attack and exploit system vulnerabilities, penetration testing methods and tools, latest security countermeasures, and various types of penetration testing and programming skills required to complete successful penetration tests and to secure real systems against real attacks.

Offered fully online or hybrid (1 lecture/week), 3 Credit hours. Instructor led.

Course Overview

Overall Proficiency Level
3 - Advanced
Course Prerequisites

IT5423

Training Purpose
Functional Development
Skill Development
Management Development
Specific Audience
All
Delivery Method
Classroom
Online, Instructor-Led
Course Location

275 Kennesaw University Road
Kennesaw, GA 30144

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led

Learning Objectives

  1. Differentiate what an ethical hacker can and cannot do legally.
  2. Evaluate security threats and vulnerabilities.
  3. Use hacking tools to locate and fix security leaks.
  4. Assess potential operating systems vulnerabilities.
  5. Compare different crypto algorithms.
  6. Manage and configure network security devices to secure real systems against real attacks.
  7. In depth knowledge of at least one network security topic.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Exploitation Analysis
  • Systems Analysis
  • Targets
  • Technology R&D

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: