Do you understand your IT vulnerabilities and common security weakness so that you can protect your environment? It is important to secure our systems and then to test that security for flaws or exploits.
This class teaches the basics of penetration testing using examples and hands-on exercises. We will explore several different aspects of modern testing methodology using current tools like Kali Linux, Burp Suite, and Nmap.
This class will cover the setup of a testing system and systems to practice on as well as the practical tests themselves. Recommended as the 6th course in the Information Security Certificate.
Performance Objectives: Upon completion of this course you should be able to:
Competencies covered in this course: Defending network, scanning applications and recognizing points of attack
Intended Audience: Anyone interested in defending their networks and applications from attack
Recommended Prerequisite: To be successful in this course, you should be familiar with using personal computers, the mouse and keyboard. You should be able to use Windows to launch and close programs; navigate to information stored on the computer; and manage files and folders. Strong knowledge of the Windows OS. Recommended as the 6th course in the Information Security Certificate