|
|
Dec 26, 2024
|
|
CCT 251 Network Vulnerabilities II Lecture: 2 Lab: 2 Clinic: 0 Credits: 3 This course advances students’ knowledge of penetration testing, network vulnerabilities, and hacking. Topics include analyzing advanced techniques for circumventing network security hardware and software. Upon completion, students should be able to assemble test kits for multiple operating systems, scan and footprint networks, and perform advanced forensic investigation.
Pre-requisite(s): CCT 250 . Course is typically offered in Spring. Course has transfer restrictions - 10 years
Student Learning Outcomes (SLOs) At completion of the course, the student should be able to do the following:
- Explain Virtual Machine Forensics, Live Acquisitions, and Network Forensics.
- Explore cloud forensics in a network environment.
- Investigate a compromised network.
- Describe methods to secure networks on different operating systems.
|
|
|