3.00 Credits
This course focuses on how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, foot-printing, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. Students learn the legal, ethical, and technical aspects of using computer systems in unexpected ways. These skills are essential for penetration testers and other network security professionals. Sp (Prerequisite: CITC 1302 Intro to Networking; Corequisite or Prerequisite: CITC 1351 Principles of Information Assurance) Not part of the TN Transfer Pathway