Catalog Description
Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Section Notes
This class has no scheduled meetings and requires the use of Canvas. All coursework is completed on Canvas using an internet enabled device. For course details, students must check the .
Requisites
Recommended Preparation, CNIT 106 or CNIT 201C or CNIT 120
Learning Outcomes