Upon successful completion of this course, the student will be able to:
Summarize hacker attack techniques, and apply methodologies, and tools.
Determine network security vulnerabilities.
Describe the history of computer crimes.
Define hackers, apply hacker techniques, tools and methodologies.
Develop a plan and perform gaining access to a network.
Describe how to defend against a worm and virus attack.
Describe and perform network reconnaissance and describe and describe the history of warfare and its relationship to.
Describe the use of social engineering in the propagation of worms and viruses.