Computer Networking Technology - CNT 180
Ethical Hacking and System Defense
3 Credit Hours3 Lecture Hours
This course is designed to familiarize students with an offensive security mindset toward defending networks and systems from the bad actors in cyberspace. Students will explore ethical hacking techniques and tools to better understand how to protect resources from various adversaries and attacks. Additional areas of focus include legal considerations, defensive technologies and security incident response.
(A requirement that must be completed before taking this course.)
Upon successful completion of the course, the student should be able to:
- Outline the steps involved with an ethical hacking methodology.
- Explain the importance of physical access controls as part of a defense-in-depth strategy.
- Summarize the footprinting, scanning and enumeration processes as parts of system evaluation.
- Demonstrate ethical behavior and knowledge of responsibilities required when using security technologies.
- Analyze systems and software using security testing or invasive software in a closed network environment.
- Determine countermeasures to mitigate network, software and social engineering attacks.
- Explain why ethical hacking and testing play an important role in a comprehensive security strategy.
- Outline measures to be taken in the event of a security incident.
- Explore evidence handling guidelines and other legal considerations related to security incidents.
Currently no sections of this class are being offered.
Key: Day of the Week
- T = Tuesday
- R = Thursday
- S = Saturday
- X = Sunday