LAN163 (IT Security Practices )

This course provides an overview of penetration testing. The course will explore techniques used by network hackers and malicious code developers. The course includes an overview of the structured certified hacking process including; stealthy network recon; passive traffic identification; privilege escalation, vulnerability identification, remote access, spoofing; impersonation, brute force attacks, exploit payloads, and cross site scripting. The course will also include penetration testing policies and documentation requirements. This course is designed to prepare the successful student for the CEH certification. The topics in this lesson align to the domains of EC-Council�۪s Certified Ethical Hacker Certification. You can find out more about this certification by visiting EC-Council.
Microsoft Word Syllabus (183 KB)
file Course Documents (480 KB)
file Storyline (26 MB)
file SCORM (28 MB)
file Lessons (14 MB)
Date:
2013-11
Primary Material Type:
Online Course
Institution:
Moraine Valley Community College
Project Name:
National Information, Security, and Geospatial Technology Consortium (NISGTC)
Funding Source:
TAACCCT Round 1
Subjects:
Ethical Hacking, Penetration Tester, Port Scanning, Vulnerability Scanning, Enumeration, Reconnaissance, Footprinting, Competitive Intelligence Gathering, Fingerprinting

Industry / Occupation

Industry Partner:
Business & Industry Leadership Teams (BILTs)
Industry Sector:
Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)
Occupation:
Computer and Mathematical Occupations (15-0000)

Education / Instructional Information

Instructional Program:
Computer and Information Sciences and Support Services (11)
Credit Type:
  • Credit
Credential Type:
  • Stacked/Latticed Credential Model
  • Associate Degree
Educational Level of Materials:
  • 1st year Community College or equivalent
  • 2nd Year Community College or equivalent
Language:
English (United States)
Interactivity Type:
Presentation only - requires user to navigate through content.
Quality of Subject Matter was assured by:
  • Other
Quality of Online/Hybrid Course Design assured by:
  • None
Course Note:
Cybersecurity

Copyright / Licensing

Primary License:
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.