Fort Peck Catalog

ITS 274 Ethical Hacking and Network Defense

The ethical hacker and network defense course provides students access into the cybersecurity field. The course covers the five phases of ethical hacking - reconnaissance: also known as the preparatory phase, the reconnaissance phase is the phase in which the hacker gathers information about a target before launching an attack. This task is completed in phases prior to exploiting system vulnerabilities; scanning: in the scanning phase, the hacker identifies a quick way to gain access to the network and look for information; gain access: hackers gain access to the system, applications, and network, and then escalate user privileges to take control of systems; maintain access: the hacker continues accessing the organization's systems to launch additional attacks on the network; cover your tracks: after the hacker gains access, it is necessary to cover evidence of the system having been hacked to avoid being detected by security personnel.

Credits

3

Prerequisite

NTS 104, ITS 272

Distribution

Computer Technology

Offered

Fall