IT 280 Ethical Hacking
Ethical hacking methodology that can be used in a penetration testing or ethical hacking situation preparing students for the EC-Council ANSI accredited Certified Ethical Hacker credential 312-50. Lab intensive environment developing in-depth knowledge and practical experience with the current essential security systems. Develop understanding how perimeter defenses work and then will be led into scanning and attacking lab networks; no real network is harmed. Understand how intruders escalate privileges and what steps can be taken to secure a system though Intrusion Detection, Policy Creation, Social Engineering, Buffer Overflows and Penetration Testing.
Prerequisite
IT 245 with a grade of C or higher