CNIT 123 - Ethical Hacking & Network Defense
Welcome to CNIT 123: Ethical Hacking & Network Defense!
In this course, we will learn:
- Basics of ethical hacking and network defense
- About attacks and how to defend Windows and Linux systems
- What an ethical hacker can and cannot do legally
- Evaluate credentials and roles of penetration testers
After successful completion of this course, students will be able to:
- Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers.
- Perform reconnaissance on a target network using a variety of scanning and probing techniques.
- Enumerate and classify Microsoft and Linux Operating Systems vulnerabilities.
- Take control of Web Servers and wireless networks, and protect them.
- Evaluate and select cryptography and hashing methods, and perform attacks against them
- Select and implement security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
Claim your RAM ID first, if you have not done so previously.
Visit the RAM ID login portal.
Your login name will be your CCSF student ID, such as W12345678. The same as your RAM ID.
Instructor: Elizabeth Biddlecome