Description
In this course, the students will develop skills in how to scan, test, hack and secure systems. Implement perimeter defenses, scan and attack virtual networks. Other topics include intrusion detection, social engineering, foot printing, DDoS attacks, buffer overflows, SQL injection, privilege escalation, trojans, backdoors and wireless hacking. Legal restrictions and ethical guidelines emphasized.