3.00 Credits
This course focuses on how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. Students learn the legal, ethical, and technical aspects of using computer systems in unexpected ways. These skills are essential for penetration testers and other network security professionals. Co-requisite Course: Network Security Prerequisite Course: Introduction to Networking, Programming Logic & Design