Syllabus IT 430-002 Ethical Hacking - Ethical Hacking for...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethical Hacking for Administrators Syllabus IT 430 Section 002 Instructor: Stan J. Senesy ( [email protected] ) Office: NJIT Newark, GITC rm. 3803. (973)596-5288. Office hours: 10 – 11:30am, 1 – 3pm Website: Text: , Cisco Press, Indianapolis, IN. 2006 ISBN: 1-58705-208-3 Schedule: Monday 10 – 11:25am TIER 113 Friday 10 – 11:25am GITC 1204 Course Description This course will explore the various means that an intruder has available to gain access to computer resources. We will investigate weaknesses by discussing the theoretical background behind, and whenever possible, actually performing the attack. We will then discuss methods to prevent/reduce the vulnerability. What is ethical hacking? The threat to systems is one that is continuously changing and evolving. It is not sufficient that a System Administrator harden a system based upon the threats that are currently known. Typically, one must think out of the box with the mentality that in order to catch a thief, you need to think like a thief. The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits . Vulnerability testing and security audits will not ensure the security proofing of an organization because they test only exploits which are currently known. To ensure that systems are adequately protected, administrators must probe networks and assess the security posture for vulnerabilities and exposure. The quote the certification guide, an Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. Hacking is a felony in the United States and most other
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/25/2011 for the course ECE 101 taught by Professor Sd during the Spring '11 term at Birla Institute of Technology & Science, Pilani - Hyderabad.

Page1 / 3

Syllabus IT 430-002 Ethical Hacking - Ethical Hacking for...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online