Companies are falling victim to data breaches at an alarming rate. By 2020, enterprises and governments will fail to protect 75% of sensitive data (Gartner). Become a part of the solution by training to be an asset in this critical industry.
Enter the world of ethical hacking by learning to understand and identify weaknesses and vulnerabilities in target systems. You will use the same methods and tools as a malicious hacker, but in a lawful and ethical manner to evaluate the target system’s security. This class will help prepare you to take the Certified Ethical Hacker (CEH) certification exam. Textbook is required at the first class meeting and is available at the KSU Center bookstore. Internet access is also required. It is strongly recommended that students have a background or interest in information security.
The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. You can find more information about this certification by visiting https://www.eccouncil.org
Prerequisite: High school diploma or equivalent. Complete the Basic Skills Assessment and submit Program Application. Working knowledge of computers and access to computer and Internet are required. Students should have a basic understanding of network operations and security terminology. The Basic Skills Assessment & Program Application are located online. Click here for the Basic Skills Assessment and Program Application instructions. Textbooks are required on the first day of class. Textbooks should be purchased new as you will need the access codes included in them for class. In addition, students will need to purchase access to the iLab site, but will get an academic discount. This will give 6 months of access to a virtual lab environment with step-by-step instructions where you can practice at home and in the classroom. Further instructions for purchasing iLabs will be available closer to class time.
- Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements.
- Analyze different phases of hacking and recommend the strategy to use ethical hacking for assessing security of various components of information systems.
- Compare and contrast different hacking techniques and analyze the legal implications of hacking.
- Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures.
- Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information.
- Compare and contrast various network security assessments and hacking tools.
- Assess various network security techniques and tools, and implement the appropriate level of information security controls based on evidence, information, and research.