LAN163 (IT Security Practices )

No Thumbnail Available

Keywords

Ethical Hacking, Penetration Tester, Port Scanning, Vulnerability Scanning, Enumeration, Reconnaissance, Footprinting, Competitive Intelligence Gathering, Fingerprinting

Project

National Information, Security, and Geospatial Technology Consortium (NISGTC)

Authors

Sands, SUsan

Date Submitted

2013-11

Material Type

Online Course

Secondary Material Type

Institution

Moraine Valley Community College

Industry Partner

Business & Industry Leadership Teams (BILTs)

License

CC BY

Funding Source

TAACCCT Round 1

Additional Public Access

Abstract

This course provides an overview of penetration testing. The course will explore techniques used by network hackers and malicious code developers. The course includes an overview of the structured certified hacking process including; stealthy network recon; passive traffic identification; privilege escalation, vulnerability identification, remote access, spoofing; impersonation, brute force attacks, exploit payloads, and cross site scripting. The course will also include penetration testing policies and documentation requirements. This course is designed to prepare the successful student for the CEH certification. The topics in this lesson align to the domains of EC-Council�۪s Certified Ethical Hacker Certification. You can find out more about this certification by visiting EC-Council.

Industry (NAISC)

Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)

Occupation (SOC)

Computer and Mathematical Occupations (15-0000)

Instructional Program (CIP)

Computer and Information Sciences and Support Services (11)

Credit Type

Credential Type

Stacked/Latticed Credential Model
Associate Degree

Educational Level

1st year Community College or equivalent
2nd Year Community College or equivalent

Skill Level

Quality Assurance Organization