CISW 250 Ethical Hacking and Countermeasures

To understand why IT vulnerabilities exist, and how to protect a system or network against them, one must understand the nature of these vulnerabilities, and how they are used to gain access to networks and systems. In a closed, controlled setting, students will learn the methodologies, tools and techniques used by penetration testers in order to properly secure their networks and systems. Prerequisites: CISW 240, CISW 236.

Credits

3.00 Credits

CISW 250Ethical Hacking and Countermeasures

Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.

I. General Information

Department

II. Course Specification

Credit Hours Narrative

3.00 Credits

III. Catalog Course Description

To understand why IT vulnerabilities exist, and how to protect a system or network against them, one must understand the nature of these vulnerabilities, and how they are used to gain access to networks and systems. In a closed, controlled setting, students will learn the methodologies, tools and techniques used by penetration testers in order to properly secure their networks and systems. Prerequisites: CISW 240, CISW 236.

IV. Student Learning Outcomes

V. Topical Outline (Course Content)

VI. Delivery Methodologies