Ethical Hacking
Ethical Hacking:
This subject introduces students to ethical hacking, focusing on legal hacking practices performed with the organization’s permission to enhance network security. It explores how attackers target networks, the tools they use, and how ethical hackers can apply similar techniques. The emphasis is on understanding the reality of data loss and securing data against various types of attacks.
Knowledge Core Competency Objectives:
- List the fundamentals of ethical hacking.
- Describe ways data can be stored and how cryptography can be defeated.
- List the different stages of an attack.
- Summarize how to set up an environment for identifying insecurities and data leakages.
- State the concepts of extensions to bypass security controls and perform injection attacks.
- List different attacks specific to cross-platform apps.
- List varieties of malware and how each can be created, used, or defended against.
- Explain how to target, analyze, and work with mobile devices.
- Summarize the process of integrating secure cloud technologies.
Skill Core Competency Objectives:
- Analyze the stages an ethical hacker requires to compromise a target system.
- Utilize tools and techniques for penetration testing.
- Critically evaluate security techniques used to protect system and user data.
- Demonstrate systematic understanding of security concepts at the policy and strategy levels in a computer system.
- Apply stages to prevent a cyber attack.
- Perform basic reconnaissance exercises.
- Scan and enumerate a network and a computer system.
- Utilize various types of malware and cyber attack vectors and players.
- Execute basic attacks against network and computer systems.
- Perform various methods for evading security controls.
- Perform vulnerability and pen testing assessments and exercises.
Upon completing this subject, students are expected to possess both knowledge and practical skills to secure vulnerabilities, understand attack techniques, and defend applications, contributing to the enhancement of cybersecurity measures within an organization.