


Simpson, Kent Backman, and James Corley - ISBN: 9781285454610 Textbook Hands-On Ethical Hacking and Network Defense, Third Edition by Michael T. Select and implement security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
.jpg)
Evaluate and select cryptography and hashing methods, and perform attacks against them.Take control of Web Servers and wireless networks, and protect them.Enumerate and classify Microsoft and Linux Operating Systems vulnerabilities.Perform reconnaissance on a target network using a variety of scanning and probing techniques.Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers.
OBSCURE 2 LOCKPICKING SCHOOL HOW TO
Learn about attacks and how to defend Windows and Linux systems.Īfter successful completion of this course, students will be able to: Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. Legal restrictions and ethical guidelines will be taught and enforced. Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. CNIT 123: Ethical Hacking and Network Defense - Sam Bowne CNIT 123Įthical Hacking and Network Defense Spring 2018 Sam Bowneģ6684 501 Lec SAT 10:10 - 1:00 PM SCIE 37 Schedule
