Dec 07, 2025  
2025-2026 Undergraduate Catalog 
    
2025-2026 Undergraduate Catalog

ITC 32800 - Intrusion Detection



This course is an introduction to ethical hacking tools and techniques. It covers various techniques for ethical hacking and defense of attacks, including footprinting; vulnerability scanning and exploits; web, database, and wireless attacks; malware and system exploits; traffic analysis; incident response; and defensive technologies and controls. Students will learn how to discover vulnerabilities, attack and defend systems, respond to attacks, and identify and design controls to prevent future attacks.

Preparation for Course
P: ITC 33100.

Cr. 3.
Student Learning Outcomes
1. Explain the current state of hacking and penetration testing, including ethical and legal implications, and the role of the ethical hacker.
2. Describe fundamental protocols and technologies related to networking.
3. Describe cryptography.
4. Describe forms of active and passive reconnaissance, enumeration, exploitation, and hacking.
5. Identify information, system, and network vulnerabilities and threats.
6. Explain network sniffing and other forms of network attacks.
7. Perform incident handling, identify security controls, and apply defensive tools and techniques.