CIS 245 Ethical Hacking and Defense
This course is building on students understanding of overall IT security and prior learned security mitigation technologies, such as configuring firewalls. Students locate and exploit vulnerabilities of users, servers, endpoint devices, wireless, mobile, cloud devices, etc. using common attack tools. Students will suggest defense technologies to mitigate those attacks. Curriculum is designed to support student preparation for the EC-Council Certified Ethical Hacker (CEH) certification. Prerequisite: CIS 136 and CIS 235. Corequisite: CIS 232