This course provides foundational knowledge and practical skills in ethical hacking and penetration testing within the context of information security. Students will engage with tools and techniques used by ethical hackers to assess and secure computer systems, including Linux commands, vulnerability analysis, reconnaissance, system hacking, and web application attacks. The curriculum covers Linux system structure, proxy chains, information gathering, wireless attacks, DNS and web scanning, password cracking tools, OS vulnerabilities, programming for security, and penetration testing practices. Through hands-on labs, virtualized penetration testing environments, scripting tasks, and a final capstone report, participants will develop practical skills in network defense, vulnerability exploitation, and ethical assessment methodologies.
This course is designed for undergraduate students in the Bachelor of Science in Information Technology program and emphasizes CompTIA Security+ and CySA+ certification readiness, real-world tool usage (e.g., Kali Linux, Bash, John the Ripper), and adherence to ethical standards in cybersecurity practice.








