Skip to main page content

Course

This course prepares students to assess and then correct vulnerabilities present within information systems. Students are introduced to tools and penetration testing methodologies used by ethical hackers. What and who ethical hackers are and how they protect corporate and government data from cyber-attacks is discussed. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types" systems are also investigated.

Have Questions?

If you have any questions about our online programs, the courses offered, the registration process, or any other Online Education related questions, reach out to us. For technical issues, visit our Technical Support page.

Loading...

Contact

Online Education

⠀⠀⠀⠀⠀