CISW 250 Ethical Hacking and Countermeasures
To understand why IT vulnerabilities exist, and how to protect a system or network against them, one must understand the nature of these vulnerabilities, and how they are used to gain access to networks and systems. In a closed, controlled setting, students will learn the methodologies, tools and techniques used by penetration testers in order to properly secure their networks and systems. Prerequisites: CISW 240, CISW 236.
CISW 250Ethical Hacking and Countermeasures
Please note: This is not a course syllabus. A course syllabus is unique to a particular section of a course by instructor. This curriculum guide provides general information about a course.
I. General Information
II. Course Specification
Credit Hours Narrative
3.00 Credits
III. Catalog Course Description
To understand why IT vulnerabilities exist, and how to protect a system or network against them, one must understand the nature of these vulnerabilities, and how they are used to gain access to networks and systems. In a closed, controlled setting, students will learn the methodologies, tools and techniques used by penetration testers in order to properly secure their networks and systems. Prerequisites: CISW 240, CISW 236.
IV. Student Learning Outcomes
V. Topical Outline (Course Content)
VI. Delivery Methodologies