Topics covered in this course include: introduction to Ethical Hacking; Hacking Laws; Footprinting; Google Hacking; Scanning; Enumeration; System Hacking; Trojans and Backdoors; Viruses and Worms; PhishingPhishing; Session Hijacking; Hacking Web Servers; Network Devices & Attacks; Denial of Service Attacks; Hacking Wireless Networks; Hacking Laws and Legal and Ethical Considerations.
Intended learning outcomes
Knowledge &understand
The student is able to define ethical hacking
The student's knowledge of potential security threats to computer systems
The student's knowledge of the skills required to become an ethical hacker
The student's knowledge of the concept of social engineering
mental skills
The student can protect data using encryption
The student can crack the password for the application
The student distinguishes between Trojans, Viruses and Worms
The student can find the appropriate ways to penetrate computer systems
Practical & professional skills
The student should apply the concept of ARP poisoning to computer systems
The student can eavesdrop on networks and passwords using Wireshark
The student uses Aircrack-ng tools to hack wireless networks
The student uses the appropriate tools to protect against DoS (denial of service)
General and transferable skills
Ability to submit assignments and write reports
The student's ability to create virtual labs via VMware or VirtualBox
The ability to download and install the latest versions on the Internet for Kali Linux programs
Ability to use Terminal software
Teaching and learning methods
Video lectures on YouTube
PDF lectures are on the ClassHub learning platform.