CSC-273 Ethical Hacking

This course features extensive hands-on activities for current ethical hacking/penetration testing techniques used in industry today. Topics include encryption, hashing, man-in-the-middle attacks, password cracking, spoofing, reconnaissance, port scanning, exploiting, covering tracks, Google Hacking, social engineering, and more. Various tools and utilities will be used throughout the course.

Credits

3

Prerequisite

CSC-260

Lecture Contact Hours

3

Lab Contact Hours

0

Other Contact Hours

0

Department

  • Computer Science

Grading Scheme

  • Letter

SUNY Gen Ed Credit

  • No