Unless otherwise indicated, a grade of C or higher is required for all prerequisite
Students will scan, test, hack and secure systems, implement perimeter defenses, and
scan and attack virtual networks. Other topics include intrusion detection, social
engineering, footprinting, DDoS attacks, buffer overflows, SQL injection, privilege
escalation, trojans, backdoors and wireless hacking. Legal restrictions and ethical
guidelines emphasized. This course also helps prepare students to pass the Certified
Ethical Hacker (C|EH) exam.