NWIT 246 - Attacker Tools and Techniques
Focuses on methods attackers use to successfully compromise target networks. Students learn how attackers perform initial reconnaissance and footprinting and then move on to scanning and eventual exploitation. This course approaches security from the hacker’s perspective. PREREQUISITE(S): CMSC 253 and NWIT 245, or consent of department.
Three hours each week.
3 semester hours
Upon course completion, a student will be able to:
- Describe common OS and application vulnerabilities.
- Identify malware that can infect a network.
- Utilize tools for scanning and sniffing.
- Conduct vulnerability scanning in order to identify vulnerabilities and determine exploitation strategies of various systems and applications using a careful and well written documented methodology.
- Identify tools to bypass a firewall.
- Identify the different operating systems available on mobile devices and the vulnerabilities of each.
- Describe various USB devices and explain common attacks and hacking and security tools for USB’s.
- Evaluate various pen-testing tools.
View Schedule of Classes
Add to Favorites (opens a new window)