Loading...

Course Description

Explore the world of cyber attackers, including cybersecurity threats, data breaches and data exfiltration. This course offers a non-technical exploration of common exploit methods and security vulnerabilities in IT and network infrastructures. You will learn how penetration testing can identify and mitigate vulnerabilities, reducing the risk of cyber threats and safeguarding confidential information.

Learner Outcomes

  • Understand key cybersecurity terms such as vulnerability, risk, and exploitation.
  • Explore core concepts and principles of ethical hacking.
  • Identify characteristics of phishing emails and how to recognize them.
  • Discover how ethical hacking can uncover hidden system weaknesses and security gaps.
  • Understand the typical steps involved in conducting an ethical hacking assessment.
  • Get introduced to commonly used ethical hacking tools in today’s cybersecurity landscape.

Prerequisites

Curiosity about Ethical Hacking. A cursory knowledge of some Ethical Hacking tools, such as Kali Linux, Metasploit, WSireshark, etc. is helpful (not required).
Loading...
Enroll Now - Select a section to enroll in
Section Title
Ethical Hacking & Penetration Testing
Type
Online: With Live Meetings
Days
T
Time
6:00PM to 8:00PM
Dates
Jun 24, 2025
Schedule and Location
Contact Hours
2.0
Course Fee(s)
Tuition and Fees non-credit $69.00
Instructors
  • Ravi Das
Reading List / Textbook
Section Notes
Required fields are indicated by .