An ethical hacker is a security expert who attacks a system on behalf of the system's owners. This course focuses on discovering network vulnerabilities that a malicious hacker can exploit. The course explores penetration testing, footprinting and social engineering, scanning and enumeration, operating system weaknesses, and the methods used to hack web servers and wireless networks. Students perform hands-on projects using state-of-art hacking tools and techniques after extensive planning.
By the end of this course, the student will be able to:
- Design a comprehensive penetration test plan for a nationwide or global/international organization utilizing state-of-the-art pen test tools to identify critical weaknesses in the organization's information infrastructure and operating policies.
- Evaluate the ethical soundness of potential actions, such as responsible disclosure and whistleblowing, that result from the discovery of vulnerabilities.
- Create a detailed report documenting penetration test results that identifies information security vulnerabilities and risks the organization faces. (Assessing Implications to organization).
- Develop risk mitigation strategies and recommendations to resolve identified vulnerabilities for utilization by senior management decision makers and implementing technicians that are inline with the organization's mission and capabilities.