Ethical Hacking

Overview

Subject code

CYBS

Course Number

3750

Description

In this course students will learn vulnerability scanning, passive and active reconnaissance, and vulnerability management. This course provides an in-depth examination of network attacks, wireless attacks, application-based attacks, and attacks on cloud computing systems. Students will learn to identify scripts in multiple software deployments, analyze various scripts and code samples, explain the tools used in a penetration test, and perform post-exploitation procedures. Students will also explore penetration testing skills for traditional physical environments, cloud computing environments, web applications, and the Internet of Things (IoT). Prerequisites: CYBS 2210, CYBS 2220, CYBS 2230, and CYBS 2240

Credits

Min

3

Min

3

Min

3

Requisites