Course Description

Provides an in-depth exploration of various methods for attacking and defending a network. Explores network security concepts from the point of view of the hacker and their attack methodologies. Discusses hackers, network attacks, malicious code, computer crime, industrial espionage and information warfare (4 semester credit hours).


Introduction

This course introduces the student to the process and tools, including nmap and other port scanning tools, used to perform ethical hacking. A discussion of different network attacks, computer crime, and hacking is provided.

Purpose

The purpose of this course is to inform the student of common techniques used by attackers in order to increase awareness and assist the student learn how to effectively counter these attacks.

Additional Information

This course also includes content, as indicated below in parenthesis behind each learning objective, which directly maps to DHS/NSA’s Center of Academic Excellence – 2 Year (CAE2Y) criteria.

Course Prerequisites and Minimum Technical Requirements for the ITN 260 Course:

Students must be able to read and write at a college level. In addition to ITN 260, students need to be able to independently install software and be familiar with command line syntax. Windows and Linux commands will be used.

Current information on NOVA's Cybersecurity Program