![]() Perform port scans to locate potential entry points to servers and networks.Perform footprinting to learn about a company and its network.Explain the threats and countermeasures for physical security and social engineering.Define the types of malicious software found in modern networks.Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers. ![]() Upon successful completion of this course, the student will be ![]() Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals Vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and Students will perform many hands-on labs,īoth attacking and defending, using port scans, footprinting, exploiting Windows and Linux Students will learn legal restrictions andĮthical guidelines, and will be required to obey them. Such attacks, using both Windows and Linux systems. Students learn how hackers attack computers and networks, and how to protect systems from CNIT 123: Ethical Hacking and Network Defense - Sam BowneĬNIT 123 Ethical Hacking and Network Defense Fall 2010 Sam Bowne Wardriving Results Schedule
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |