|CSC 6224||Ethical Hacking|
|Prerequisites||CSC 2720 (Data Structures) and CSC 3320 (System Level Programming)|
Introduction to the methods and techniques used by computer hackers for malicious activity and by penetration testers for defensive measures. Understanding of the techniques used by intruders will lead to the design of countermeasures for secure computer systems. Students will implement hands-on experiments to learn identification of vulnerabilities in servers, websites, wireless networks, and cryptologic systems.