|
Jan 17, 2025
|
|
|
|
TNC 3020 - Cyber Security
Clock Hours: 226
Delivery Mode on-ground
Course Description: This course is designed to educate students about how to move into the cybersecurity field. It covers the five phases of ethical hacking; reconnaissance, scanning, gain access, maintenance access, and cover your tracks; in order to prepare you to create a counter attack.
Student Learning Outcomes:
- Understand penetration testing to find vulnerabilities and risks with the purpose of securing a computer or network system.
- Understand the concept of social engineering and methods hackers use to manipulate people to give out information or perform tasks that will give up critical information.
- Understand how reconnaissance is used as a systematic attempt to locate, gather, identify, and record information about a target.
- Understand how to identify scanning on a network; the process of actively connecting to a system to get a response and gather information.
- Understand the enumeration phase, where you will extract and record as much information as you can about a network or system.
- Understand how to use a vulnerability assessment to identify weaknesses in an organization infrastructure, including the operating system, web applications, and web server.
- Understand the importance of and how to implement a strong password policy to diminish the possibility of hacking.
- Understand how to combat various forms of malware.
- Understand how to utilize tools; such as, sniffing, switched network sniffing, Wireshark, TCPDump, and additional sniffing tools to locate vulnerabilities in your network.
- Utilize IDS (intrusion detection system) to monitor network traffic for suspicious activity. This included the use of firewalls and honeypots.
- How to identify and protect networks from web server and web application attacks and SQL injections.
- How to identify and protect against WiFi, Bluetooth, and Mobile Device attacks.
- Understand the concept of Cloud Computing and Internet of Things and how to secure and protect them from attacks.
- Understand the process of cryptography to convert data into secret code during transmission.
|
|