May 2019 Undergraduate Catalog 
    Sep 28, 2022  
May 2019 Undergraduate Catalog [ARCHIVED CATALOG]

IT 338 - Ethical Hacking

The threat to systems is one that is continuously changing and evolving. The goal of the ethical hacker is to help organizations take pre-emptive measures against malicious attacks by attacking the system themselves while staying within legal limits. This course will explore the various means that an intruder has available to gain access to the security of a network and various resources. Students will be introduced to penetration testing with the ethics and responsibilities of testing in mind as well as various security attacks to the advanced level. The course will have an intense laboratory component which will be limited to student networks. Foundations in security policy, perimeter defenses, intrusion detection, security monitoring, liability issues, and ethics will be covered. Topics to be covered include, but are not limited to, penetration testing, enumerating, footprinting, scanning, hacking techniques, firewall, IDS, procedural documentation, host reconnaissance Trojans, backdoors, and system attacks such as WLAN, database servers, web servers, and e-mail servers. It must be noted that hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an Ethical Hacker and an organization, it is legal. Semester Credit Hours 3.00 semester credit hours Contact Hours: 60.00 Prerequisite: IS 283 Network Security . Corequisite: None.