As the Enemy, how would you attack a target? To be able to complete the puzzle, this is important to understand how to protect that target from the “bad guys”. We live in an increasingly interconnected world with almost everything in our lives connected to a communications network. Everything connected to that network is a potential opening for the ne’re-do wells to attack, steel and destroy. Here is the knowledge of how those who wish to do harm could penetrate our fortress, and pillage. As Sun Tzu said in his famous “The Art Of War”: “If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.”
Purpose of Class:
This class is designed to provide students an insight of current security scenario and increasing hacking attempts on various information systems. The goal of the ethical hacking and countermeasures is to help the organizations take preemptive measures against malicious attacks by attacking the system themselves staying within legal limits.
Course Learning Outcomes:
Students who successfully complete this class will be able to:
- Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
- Know different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information system.
- Compare and contrast different hacking techniques and analyze the legal implications of hacking.
- Examine different vulnerabilities, threats and attacks to information systems and recommend the countermeasures.
- Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information
- Compare various network security assessment and hacking tools.
- Evaluate various network security techniques and tools and implement appropriate level of information security controls based on evidence, information, and research.
Managing Secure Network Systems
Investigating Network Intrusions
Security Analysis and Vulnerability Assessment
Foundations to Organizational Behavior