| |
Dec 07, 2025
|
|
|
|
|
2025-2026 Undergraduate Catalog
|
ITC 32800 - Intrusion Detection
This course is an introduction to ethical hacking tools and techniques. It covers various techniques for ethical hacking and defense of attacks, including footprinting; vulnerability scanning and exploits; web, database, and wireless attacks; malware and system exploits; traffic analysis; incident response; and defensive technologies and controls. Students will learn how to discover vulnerabilities, attack and defend systems, respond to attacks, and identify and design controls to prevent future attacks.
Preparation for Course P: ITC 33100.
Cr. 3. Student Learning Outcomes 1. Explain the current state of hacking and penetration testing, including ethical and legal implications, and the role of the ethical hacker.
2. Describe fundamental protocols and technologies related to networking.
3. Describe cryptography.
4. Describe forms of active and passive reconnaissance, enumeration, exploitation, and hacking.
5. Identify information, system, and network vulnerabilities and threats.
6. Explain network sniffing and other forms of network attacks.
7. Perform incident handling, identify security controls, and apply defensive tools and techniques.
|
|