To develop a comprehensive understanding of how to secure business systems. Background to ethical hacking; footprint and reconnaissance; scanning networks; enumeration; system hacking; Trojans, backdoors, sniffers, viruses and worms; social engineering; DoS; DDoS, hijacking and hacking; cryptography and penetration testing.