INT-2681 Ethical Hacking Certification Preparatio Credits 3 This course provides an understanding of how to ethically and effectively assess an organization’s security posture from threat agents. This course is designed for those interested in penetration testing and vulnerability assessment, or who want to take the EC-Council’s Certified Ethical Hacker (CEH) exam.
This course replaces both INT-1680 andINT-2680 . Students who have completed INT 1680 must take this course. Students may not receive credit for both INT 2680 and INT 2681. Prerequisite(s): INT-1620 and INT-1700, both with a grade of “C” or better. Formerly (This course replaces both INT-1680 and INT-2680 . Students who have completed INT-1680 must take this course, INT-2861. Students may not receive credit for both INT-2680 and INT-2681.) 2 class/2 lab hours. Course Outcomes
- Explain TCP/IP and networking fundamentals.
- Explain ethical hacking issues, rules of engagement, and penetration methodology.
- Describe security threats, crypto system attacks, vulnerabilities, and threat actors.
- Perform vulnerability assessment and penetration testing using appropriate tools.
- Analyze wireless, perimeter, and infrastructure security zone concepts.
- Describe operating system hardening and application vulnerabilities.
- Explain organizational security posture through security assessment and audit.
- Explain legislative computer and network trespassing, financial, and health care security acts.
Add to Portfolio (opens a new window)
|