This course is designed to cover cybersecurity defense analysis through threat design and test it against an organization’s information assets. At the end of the course students will be able to design and create their own exploitation artifacts to test the security of a cyber-infrastructure and its cyberspace in a controlled environment. Students will be able to take advantage of knowledge acquired through previous courses designing threats, and performing exploitation testing to uncover hidden IT Operation security vulnerabilities.  

The course will use Kali Linux extensively as a practical tool to simulate security challenges in an IT network. The work in Kali Linux may be done in the AI or IT lab, under the guidance of the lab technical support.




Accessibility

Background Colour Background Colour

Font Face Font Face

Font Kerning Font Kerning

Font Size Font Size

1

Image Visibility Image Visibility

Letter Spacing Letter Spacing

0

Line Height Line Height

1.2

Link Highlight Link Highlight

Text Colour Text Colour