IS1705: Ethical Hacking – Vulnerability Analysis & Control
Desmond Israel

IS1705: Ethical Hacking – Vulnerability Analysis & Control

This course addresses hands-on ethical hacking, penetration testing, detection of malicious probes, and their prevention. It provides students with in-depth theoretical and practical knowledge of the vulnerabilities of networks of computers including the networks themselves, operating systems, and important applications. Integrated with the lectures are laboratories focusing on the use of open source and freeware tools; students will learn in a closed environment to probe, penetrate and hack other networks.

Objectives

This course provides participants with practical guide on how to assess systems for security benchmark and exploiting the vulnerabilities. Specifically, participants will earn:

·       The requirements of various cyber laws and ethical standards.

·       How to use frameworks, methodologies to assess vulnerabilities and exploit them, and provide reports.

·       The requisite techniques and best practices for securing systems from hackers.

Learning Outcomes

At the end of the course, students should be able to:

·       Detect various layers of attacks from within the attackers' killchain methodology.

·       Perform a computer hack and cover tracks after gaining access to a network.

·       Design and develop malware for backdoor intrusive attacks.

·       Specify the general expected characteristics of future threats.

·       Advise executives and policy makers on appropriate measures to secure critical infrastructures against threat agents.

·       Liaise with law enforcement agents to in dealing with cyber warfare.