Information security is at the center of the world stage. This course provides an exciting opportunity to study psychology and the tools and techniques that hackers use to infiltrate networks. The objective of this course is to know how to identify and document the real world legal and ethical penetration test for an organization. We will look at the full life cycle of a company sponsored penetration test. You will work with peer-reviewed case studies and use practical tools like Nmap, Nessus, Wireshark, Cain & Abel, Hydra, Kali Linux, Pineapple, etc.

This course ends with a final student report that a corporation can use as a guiding factor to immediately mitigate known vulnerabilities.



Accessibility

Background Colour Background Colour

Font Face Font Face

Font Kerning Font Kerning

Font Size Font Size

1

Image Visibility Image Visibility

Letter Spacing Letter Spacing

0

Line Height Line Height

1.2

Link Highlight Link Highlight

Text Colour Text Colour