Skip to Content

Ethical Hacking

Terrorist organizations fund hackers to penetrate security systems, either to damage national security features or to extort large sums by introducing malware and withholding access before international hostilities. As a result, cybercrime is on the rise. Organizations have the problem of updating hack-prevention strategies and implementing various technologies to defend the system before it becomes a victim of a hacker.

The Ethical Hacker course will teach students the most up-to-date commercial-grade hacking tools, tactics, and approaches hackers and information security experts use to lawfully hack a business.

This course is unique in that it is attack-based and vendor neutral, giving it an edge. Students are trained to think and act like hackers, using techniques used by actual hackers. This course covers both hardware and software, and features content from diverse platforms and technologies. This course is one the most comprehensive ethical hacker courses available today.

Course Highlights: 

  • Assess the current security protocols for popular operating environments.

  • Analyze preventive, corrective and protective countermeasures to safeguard systems against malicious attack.

  • Identify and crack multiple types of passwords, and effectively counter password attacks.

  • Apply the terminology, stages, classes, phases and methodologies of ethical hacking.

  • Describe cryptography & encryption techniques, and private/public key infrastructure.

Discuss common cyber attacks

Course Topics:

  • Foot printing and Reconnaissance

  • Scanning Networks and Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

Note: 

Prerequisites:

Cybersecurity Fundamentals CSE-41363

Course Number: CSE-41362
Credit: 3.00 unit(s)

+ Expand All