MAC.3090 Ethical Hacking and Penetration Testing

An introduction to ethical hacking techniques, vulnerability assessment, and penetration testing methodologies and processes, including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. The course discusses the assessment related to integrating penetration testing into a software development life cycle and assesses the pitfalls associated with traditional penetration testing practices as well as making recommendations for improving the practices.

Credits

3