This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target systems.
By the end of this course, students will be able to;
· Recognize the realm of network security.
· State and relate the basic terminology and concepts in network security.
· Explain why people attack computers and networks.
· Define the roles, responsibilities, and common challenges of security personnel to successfully combat hackers.
· Explain the difference between hacking myths and hacking facts.
· Explain what a denial-of-service (DoS) attack is
· Describe the causes of DoS attacks
· Describe the evolution of programming exploits
· Recognize Web server vulnerabilities
· Describe the steps in the identification of incidents
During this semester, the students will learn a broad range of communication and technology topics such as :
· Ethics of Hacking and Cracking
· Reconnaissance• Scanning Tools
· Sniffers• TCP/IP Vulnerabilities
· Encryption and Password Cracking
· Spoofing
· Session Hijacking
· Hacking Network Devices
· Trojan Horses
· Denial-of-Service Attacks
· Buffer Overflows
· Programming Exploits
· Vulnerabilities