ITAS 465 Ethical Hacking and Penetration Testing

This course covers techniques that hackers use to circumvent security and penetrate computers and computer networks. Topics covered include legal framework for conduction penetration testing, foot-printing, social engineering, host reconnaissance, session hijacking methods, denial of service, exploits of web server vulnerabilities, breach of database security, password crackers, Intrusion Prevention Systems (IPS) and firewalls circumvention, routers and switches services disruption, scanning and penetration of wireless networks, and overflow attacks methods and prevention. Other topics covered include creating, using, and preventing Trojan Horses, viruses, and other backdoor hostile codes.

Credits

4.5

Prerequisite

ITAS 363