CIS 299 - Special Topics - Ethical Hacking
No Thumbnail Available
Keywords
CIS, Computer Information Technology, Ethical Hacking, Security, Low-leval kernel, Hardware topics, Techniques for web applications, Exploit Techniques, Rootkits,Audit , Digital, Forensics
Project
Authors
Quamme, Ken
Date Submitted
2018-01-11
Material Type
Syllabus
Secondary Material Type
Syllabus
Institution
Williston State College
Industry Partner
The WSC Advisory Councils provide curriculum guidance and feedback within the context of industry needs.
License
CC BY
Funding Source
TAACCCT Round 4
Additional Public Access
Abstract
This course introduces the concepts of Ethical Hacking and gives the students the opportunity to learn about different tools and techniques in Ethical hacking and security and practically apply some of the tools. The course will also cover the main techniques used by computer hackers and penetration testers in order to better defend against intrusions and security violations in live systems, including low-level kernel and hardware topics, techniques for web applications, exploit techniques, rootkits and some audit techniques used in digital forensics.
Industry (NAISC)
Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)
Occupation (SOC)
Computer and Mathematical Occupations -- Network and Computer Systems Administrators (15-1071)
Instructional Program (CIP)
Computer and Information Sciences and Support Services (11)
Credit Type
Credential Type
Certificate
Stacked/Latticed Credential Model
Associate Degree
Stacked/Latticed Credential Model
Associate Degree
Educational Level
2nd Year Community College or equivalent
