
This course is designed to cover cybersecurity defense analysis through threat design and test it against an organization’s information assets. At the end of the course students will be able to design and create their own exploitation artifacts to test the security of a cyber-infrastructure and its cyberspace in a controlled environment. Students will be able to take advantage of knowledge acquired through previous courses designing threats, and performing exploitation testing to uncover hidden IT Operation security vulnerabilities.
The course will use Kali Linux extensively as a practical tool to simulate security challenges in an IT network. The work in Kali Linux may be done in the AI or IT lab, under the guidance of the lab technical support.
- Teacher: Ivan Suarez