CSC-273 Ethical Hacking

This course features extensive hands-on activities for current ethical hacking/penetration testing techniques used in industry today. Topics include encryption, hashing, man-in-the-middle attacks, password cracking, spoofing, reconnaissance, port scanning, exploiting, covering tracks, Google Hacking, social engineering, and more. Various tools and utilities will be used throughout the course.

Credits

3

Prerequisite

CSC-260

Lecture Contact Hours

3

Lab Contact Hours

0

Other Contact Hours

0

Department

  • Computer Science

Grading Scheme

  • Letter

SUNY Gen Ed Credit

  • No

Course Learning Outcomes

  1. Find vulnerabilities and recommend mitigation techniques for systems and networks
  2. Defend systems and networks from attacks
  3. Implement safe cybersecurity practices