It begins with an examination of the landscape, key terms, and concepts that a
cybersecurity professional needs to know about hackers and cyber computer criminals
who break into networks, steal information, and corrupt data. It goes on to review the
technical overview of hacking: how attacks target networks and the methodology they
follow. The final section studies those methods that are most effective when dealing
with hacking attacks, especially in an age of increased reliance on the Web. Written by
a subject matter expert with numerous real-world examples, the Second Edition
provides readers with a clear, comprehensive introduction to the many threats on
our Internet environment and security and what can be done to combat them.
-
Course Learning Outcomes
- Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements
- Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing the security of various components of the information system
- » Compare and contrast different hacking techniques and analyze the legal implications of hacking
- Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures
- » Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information
- Compare and contrast various network security assessment and hacking tools.
- Assess various network security techniques and tools and implement an appropriate level of information security controls based on evidence, information, and research