Thursday, November 21, 2013

CYBR 525, Ethical Hacking and Response:

Unexpectedly, this course does not teach one how to hack into information systems.  Hacking into a system requires knowledge of associated vulnerabilities, the tools to exploit these vulnerabilities and a desire to breach the system.  Instead, the course provides discussion and research on a number of vulnerabilities associated with the various information systems, including computer operating systems, software, web pages, wireless and internet.  Tools used by hackers to detect and exploit vulnerabilities are the same tools used by IT security professionals to detect and correct these vulnerabilities.

No comments:

Post a Comment