This course focuses on how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. Students learn the legal, ethical, and technical aspects of using computer systems in unexpected ways. These skills are essential for penetration testers and other network security professionals.
PREREQUISITES: Acceptable placement scores or completion of all Learning Support Competencies in Reading and Writing; CITC 1302 and CITC 1301.
COREQUISITES: CITC 2326.
Vocational/Career Program Designation: *Designated primarily for vocational/career programs This course may be accepted as transfer credit by some colleges and universities, but that decision is made by the receiving institution. This course is collegiate level work, but has been developed with a purpose other than being a university parallel course.
Credits: (3)