This course presents the principles behind techniques of attacks and their defenses. It introduces reconnaissance, penetration, denial of service, and covert channels. Topics include Privilege Escalation, Hijacking, Trusted booting, Packet filtration, Protocol scrubbing and Honeypots. Lab work uses tools such as MetaSploit.
Must be enrolled in one of the following Levels: Graduate, Medical, Professional.