This course focuses on how perimeter defenses work, how intruders escalate
privileges and methods of securing systems. Additional topics include intrusion
detection, policy creation, social engineering, DoS attacks, buffer overflows,
and virus creation.
-
Course Learning Outcomes
- » Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
- » Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing the security of various components of the information system
- Compare and contrast different cybersecurity hacking techniques and analyze the legal implications of hacking.
- Examine different cybersecurity vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.
- Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information
- » Compare and contrast various network security assessment and hacking tools.
- Assess various network security techniques and tools and implement the appropriate level of information controls based on evidence, information, and research.
0.0
0 total
5
4
3
2
1