LAN163 (IT Security Practices )
No Thumbnail Available
Keywords
Ethical Hacking, Penetration Tester, Port Scanning, Vulnerability Scanning, Enumeration, Reconnaissance, Footprinting, Competitive Intelligence Gathering, Fingerprinting
Project
National Information, Security, and Geospatial Technology Consortium (NISGTC)
Authors
Sands, SUsan
Date Submitted
2013-11
Material Type
Online Course
Secondary Material Type
Institution
Moraine Valley Community College
Industry Partner
Business & Industry Leadership Teams (BILTs)
License
CC BY
Funding Source
TAACCCT Round 1
Additional Public Access
Abstract
This course provides an overview of penetration testing. The course will explore techniques used by network hackers and malicious code developers. The course includes an overview of the structured certified hacking process including; stealthy network recon; passive traffic identification; privilege escalation, vulnerability identification, remote access, spoofing; impersonation, brute force attacks, exploit payloads, and cross site scripting. The course will also include penetration testing policies and documentation requirements. This course is designed to prepare the successful student for the CEH certification. The topics in this lesson align to the domains of EC-Council�۪s Certified Ethical Hacker Certification. You can find out more about this certification by visiting EC-Council.
Industry (NAISC)
Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)
Occupation (SOC)
Computer and Mathematical Occupations (15-0000)
Instructional Program (CIP)
Computer and Information Sciences and Support Services (11)
Credit Type
Credential Type
Stacked/Latticed Credential Model
Associate Degree
Associate Degree
Educational Level
1st year Community College or equivalent
2nd Year Community College or equivalent
2nd Year Community College or equivalent