Research a network, examine the traffic and identify its vulnerabilities. Computer security relies on the research and examinations provided by ethical penetration testers. This course provides a foundation for strong security research and the execution of a controlled and well documented system examination to identify weaknesses in an enterprises physical and digital systems. Student Learning Outcomes:
- Enumerate target networks and systems
- Analyze computer systems to identify potential vulnerabilities
- Identify and exploit cross-site scripting, Server Query Language (SQL) injection and file inclusion vulnerabilities
- Demonstrate creative problem solving and lateral thinking.
- Develop and deploy a buffer overflow in Linux and Windows operating systems
- Explain the ethical and legal challenges of a penetration test
- Apply the appropriate tools for specific reconnaissance or attack
- Utilize appropriate exploits depending on the presented vulnerability
- Produce a detailed test report
Please see eServices for section availability and current pre-req/test score requirements for this course.