Cyber Security and Penetration Testing

Cyber Security and Penetration Testing
Advanced computer systems security. Vulnerabilities and exploits. System and network attacks. Ethical hacking and penetration testing. Cyber security, cyber weapons, and advanced persistent threats. Legal and regulatory requirements for security and privacy.
IT
567
 Hours3.0 Credit, 2.0 Lecture, 3.0 Lab
 PrerequisitesIT 466 or C S 465 or IS 560; or equivalent content course from another institution; or concurrent enrollment.
 TaughtFall
 ProgramsContaining IT 567
Course Outcomes

Regulatory and Legal issues

1. Explain the regulatory and legal requirements, and rationale for penetration testing

Ethics

2. Hold an in-depth discussion about the ethics of cyber-security and other associated domains.

Tools

3. Demonstrate the use of various security tools, their application in a penetration test and be able to explain how such tools may be abused.

Documentation

4. Illustrate clearly, by means of a written report and verbal presentation, the results of a penetration test with clear recommendations.

Malware Tracking

5. Explain how exploits and vulnerabilities are discovered and the correct protocols to report these for vendor fixes.

Lifelong Learning

6. Be able to discuss new threat-types such as APT's and Cyber-Weapons and use these to explain why lifelong learning is critical for a security professional.