Provides an in-depth exploration of various methods for attacking and defending a network. Explores network security concepts from the point of view of the hacker and their attack methodologies. Discusses hackers, network attacks, malicious code, computer crime, industrial espionage and information warfare (4 semester credit hours).
This course introduces the student to the process and tools, including nmap and other port scanning tools, used to perform ethical hacking. A discussion of different network attacks, computer crime, and hacking is provided.
The purpose of this course is to inform the student of common techniques used by attackers in order to increase awareness and assist the student learn how to effectively counter these attacks.
This course also includes content, as indicated below in parenthesis behind each learning objective, which directly maps to DHS/NSA’s Center of Academic Excellence – 2 Year (CAE2Y) criteria.
Students must be able to read and write at a college level. In addition to ITN 260, students need to be able to independently install software and be familiar with command line syntax. Windows and Linux commands will be used.