CYBR 525, Ethical Hacking
and Response:
Unexpectedly, this course does not teach one how to hack
into information systems. Hacking into a
system requires knowledge of associated vulnerabilities, the tools to exploit
these vulnerabilities and a desire to breach the system. Instead, the course provides discussion and
research on a number of vulnerabilities associated with the various information
systems, including computer operating systems, software, web pages, wireless
and internet. Tools used by hackers to
detect and exploit vulnerabilities are the same tools used by IT security
professionals to detect and correct these vulnerabilities.
No comments:
Post a Comment