This course teaches the student to protect systems from common hacker attacks using both Windows and Linux systems. The student learns legal restrictions and guidelines and abides by them. They perform hands-on exercises which emphasize and enforce skills such as attacking and defending; using port scans; footprinting; exploiting Windows and Linux vulnerabilities; buffer overflow exploits; SQL injection; privilege escalation; MAC spoofing; and backdoor attacks.
School of Engineering and Computing
3 hours of lecture per week