IASP355
Download as PDF
Penetration and Hacking
College/School
School of Liberal Arts
Course Description
This course introduces the underlying principles and techniques associated with the cybersecurity practice known as penetration testing and ethical hacking. Student will learn about the entire penetration testing processes and practices. It includes planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. As systems are penetrated and attacked in ethical testing method, the degree of systems' weak points or the level of security strengths will be assessed. The course discusses the assessment related to integrating penetration testing into a software development life cycle and assesses the pit-falls associated with traditional penetration testing practices as well as making recommendations for improving the practices. In all cases, students will develop an excellent understanding of current cybersecurity issues and ways that user, administrator, and programmer errors can lead to exploitable insecurities.
Grade Modes
Pass/Fail (P), Standard (S)