Information security is at the center of the world stage. This course provides an exciting opportunity to study psychology and the tools and techniques that hackers use to infiltrate networks. The objective of this course is to know how to identify and document the real world legal and ethical penetration test for an organization. We will look at the full life cycle of a company sponsored penetration test. You will work with peer-reviewed case studies and use practical tools like Nmap, Nessus, Wireshark, Cain & Abel, Hydra, Kali Linux, Pineapple, etc.
This course ends with a final student report that a corporation can use as a guiding factor to immediately mitigate known vulnerabilities.