Clock tower stands tall with beautiful blue sky behind it.

Penetration Testing and Implementation

IST 2634

Credit(s): 4

This course provides an in-depth exploration of various methods for gaining unauthorized access and explores network security concepts from the point of view of hackers and their methodologies. Topics include hackers, crackers, ethical hackers, attacks, intrusion detection systems, malicious code, computer crime, and industrial espionage.  (4,2,4)