INSE 435 Hacker Tools and Techniques
Discover the history of hacking and understand the difference between ethical and black-hat hacking in this course. Examine how attackers target networks and the methods they use including footprinting, port scanning, enumeration, malware, sniffers, denial of service, and social engineering. The course provides concepts in incident response, defensive technologies and common approaches to defense. Concepts are reinforced through hands-on labs.
Prerequisite
All Technology Core courses
Washington Technology University
Syllabus
INSE 435 : Hacker Tools and Techniques
5 Credits
Approved: 12/2/2021 2:17:09 PM
Course Description
Discover the history of hacking and understand the difference between ethical and black-hat hacking in this course. Examine how attackers target networks and the methods they use including footprinting, port scanning, enumeration, malware, sniffers, denial of service, and social engineering. The course provides concepts in incident response, defensive technologies and common approaches to defense. Concepts are reinforced through hands-on labs.
Course Required Resources
- Textbook: Oriyano & Solomon. Hacker Techniques, Tools, and Incident Handling, Third Edition, Burlington, MA: Jones & Bartlett, 2018.
- Course supplements: Weidman. Penetration Testing – A Hands-on Introduction to Hacking. No Starch Press, 2014 (available in Books 24x7)
Course Keywords
Ethical hacking, Ethical laws, Exploitation, Hacker, Penetration testing, Kali Linux, Footprinting, Information gathering, Fingerprinting, Nmap, TCP/IP, Botnet, DoS, DDoS, Network sniffing, Network traffic analysis, Wireshark, Session hijacking, Enumeration, Password cracking, Privilege escalation, Rainbow table, Rootkit, Backdoors, Ps tools, System hacking, Buffer overflow, Cross-site scripting (XSS) attack, Database attack, SQL injection, Trojan, Virus, Worm, Adware, Covert channel, Malware, Ransomware, 802.11, Wi-Fi, WLAN, WPA, WPA2, WEP, Bluejacking, Bluesnarfing, Bluetooth, Social engineering, BCP, BIA, DRP, Forensics, Incident response plan, Incident response process, Defense in depth, Demilitarized zone (DMZ), Firewall, Honeynet, Honeypot, IDS, IPS, Security control