CIS 299 - Special Topics - Ethical Hacking

No Thumbnail Available

Keywords

CIS, Computer Information Technology, Ethical Hacking, Security, Low-leval kernel, Hardware topics, Techniques for web applications, Exploit Techniques, Rootkits,Audit , Digital, Forensics

Project

Authors

Quamme, Ken

Date Submitted

2018-01-11

Material Type

Syllabus

Secondary Material Type

Syllabus

Institution

Williston State College

Industry Partner

The WSC Advisory Councils provide curriculum guidance and feedback within the context of industry needs.

License

CC BY

Funding Source

TAACCCT Round 4

Additional Public Access

Abstract

This course introduces the concepts of Ethical Hacking and gives the students the opportunity to learn about different tools and techniques in Ethical hacking and security and practically apply some of the tools. The course will also cover the main techniques used by computer hackers and penetration testers in order to better defend against intrusions and security violations in live systems, including low-level kernel and hardware topics, techniques for web applications, exploit techniques, rootkits and some audit techniques used in digital forensics.

Industry (NAISC)

Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)

Occupation (SOC)

Computer and Mathematical Occupations -- Network and Computer Systems Administrators (15-1071)

Instructional Program (CIP)

Computer and Information Sciences and Support Services (11)

Credit Type

Credential Type

Certificate
Stacked/Latticed Credential Model
Associate Degree

Educational Level

2nd Year Community College or equivalent

Skill Level

Quality Assurance Organization