CSC-273 Ethical Hacking

This course features extensive hands-on activities for current ethical hacking/penetration testing techniques used in industry today. Topics include encryption, hashing, man-in-the-middle attacks, password cracking, spoofing, reconnaissance, port scanning, exploiting, covering tracks, Google Hacking, social engineering, and more. Various tools and utilities will be used throughout the course.

Credits

3

Prerequisite

CSC-260