CSS280 Ethical Hacking
This course covers ways that computers and networks are attacked by hackers using techniques and common utilities. Learners explore security threats and ways that system vulnerabilities are exploited to attack systems. Topics include Intrusion Detection Systems (IDS), ethical hacking techniques, sniffers, protocols, social engineering, vulnerability analysis, and penetration testing to ensure infrastructure security.
Corequisite
None
Distribution
Computer Science/Engineering/Information Technology