Read our cookies policy and privacy statement for more information.
×Charlotte, North Carolina
Methodologies, tools, and technologies that are important for vulnerability assessment and systems assurance. Topics include: ethical hacking techniques, vulnerability assessment, risk assessment/management, finding new exploits, discovering vulnerabilities, penetrating network perimeters, bypassing auditing systems, and assured administration of systems as well as evaluating systems assurance levels. Focus placed on: 1) understanding current penetration techniques for networks, operating systems, services and applications; 2) investigating mitigation and defense strategies; and 3) studying legal and ethical considerations. Based on case studies with a strong lab component.
Units: 3.0