Encompasses in-depth exploration of various methods for attacking and defending a network. Explores network security concepts from the viewpoint hackers and their attack methodologies. Includes topics about hackers, attacks, Intrusion Detection Systems (IDS) malicious code, computer crime and industrial espionage.
- Demonstrate mastery of describing the role of an ethical hacker, describing what you can do legally as an ethical hacker, and describing what you cannot do as an ethical hacker
- Demonstrate a mastery of describing port scanning and types of port scans, describing port-scanning tools, and explaining what ping sweeps are used for
- Demonstrate mastery in explaining the TCP/IP protocol stack and explaining the basic concepts of IP addressing
- Demonstrate mastery in describing vulnerabilities of the Windows and Linux operating systems, identifying specific vulnerabilities and explain ways to fix them