Prerequisites: CISC 333 and MATH 310
Description: Teaching the student how to hack is a legitimate means of identifying a company’s network weaknesses and can be an effective component of computer security. This course introduces the student to the role of an ethical hacker and the essential hacking technologies required. The different phases involved in hacking are exploited. The student is introduced to the techniques of penetration testing, intrusion testing, and “red-teaming.” The student also reviews of the legal considerations for working as an ethical hacker.