LAN163 (IT Security Practices )
This course provides an overview of penetration testing. The course will explore techniques used by network hackers and malicious code developers. The course includes an overview of the structured certified hacking process including; stealthy network recon; passive traffic identification; privilege escalation, vulnerability identification, remote access, spoofing; impersonation, brute force attacks, exploit payloads, and cross site scripting. The course will also include penetration testing policies and documentation requirements. This course is designed to prepare the successful student for the CEH certification. The topics in this lesson align to the domains of EC-Council�۪s Certified Ethical Hacker Certification. You can find out more about this certification by visiting EC-Council.
- Date:
- 2013-11
- Primary Material Type:
- Online Course
- Institution:
- Moraine Valley Community College
- Project Name:
- National Information, Security, and Geospatial Technology Consortium (NISGTC)
- Funding Source:
- TAACCCT Round 1
- Subjects:
- Ethical Hacking, Penetration Tester, Port Scanning, Vulnerability Scanning, Enumeration, Reconnaissance, Footprinting, Competitive Intelligence Gathering, Fingerprinting
Industry / Occupation
- Industry Partner:
- Business & Industry Leadership Teams (BILTs)
- Industry Sector:
- Information Technology -- Computer Operating Systems (Programming), Digital Forensics, Cyber Security, Network Security, IT Security (51)
- Occupation:
- Computer and Mathematical Occupations (15-0000)
Education / Instructional Information
- Instructional Program:
- Computer and Information Sciences and Support Services (11)
- Credential Type:
-
- Stacked/Latticed Credential Model
- Associate Degree
- Educational Level of Materials:
-
- 1st year Community College or equivalent
- 2nd Year Community College or equivalent
- Language:
- English (United States)
- Interactivity Type:
- Presentation only - requires user to navigate through content.
- Quality of Subject Matter was assured by:
-
- Quality of Online/Hybrid Course Design assured by:
-
- Course Note:
- Cybersecurity
Copyright / Licensing