This course teaches the student to protect systems from common hacker attacks using both Windows and Linux systems. The student learns legal restrictions and guidelines and abides by them. They perform hands-on exercises which emphasize and enforce skills such as attacking and defending; using port scans; footprinting; exploiting Windows and Linux vulnerabilities; buffer overflow exploits; SQL injection; privilege escalation; MAC spoofing; and backdoor attacks.
-
School
School of Engineering and Computing
-
Number
4240
-
Subject
Computer (CIS)
-
Semester
Fall
-
Lecture/Lab/Seminar Hours
3 hours of lecture per week
-
Prerequisites
-
Credits
3