|
Apr 25, 2024
|
|
|
|
ITIA 2800 - Penetration Testing & Analysis Credit Hours: 3.00 Prerequisites: ITIA 1310
Corequisites: ITCS 1140
This course builds on skills and knowledge learned in ITIA 1310 and ITIA 1500 to analyze the security of networks and devices. Students will use tools and applications that are common in the cybersecurity industry like Nmap, Wireshark and Kali to analyze networks, interpret information and recommend changes to reduce security risks and vulnerabilities. This course will focus on the tools, techniques and reporting used in penetration testing and analysis.
Location: South Campus
Contact Hours: 3 Billable Contact Hours: 3 OUTCOMES AND OBJECTIVES Outcome 1: Students will use penetration testing applications
Objectives:
- Explain the appropriate use of penetration testing applications
- Explain how penetration testing applications work
- Demonstrate how penetration testing applications work
- Analyze data related to penetration testing
Outcome 2: Students will evaluate systems for penetration testing
Objectives:
- Assess different security systems
- Describe different exploitation techniques
- Recommend an appropriate exploitation method for a given situation
Outcome 3: Students will write a penetration testing report
Objectives:
- Interpret data from penetration testing applications
- Explain the implications of penetration testing results
- Recommend mitigation strategies for vulnerabilities
COMMON DEGREE OUTCOMES (Bulleted outcomes apply to the course)
- 1. The graduate can integrate the knowledge and technological skills necessary to be a successful learner.
|
- 2. The graduate can demonstrate how to think competently.
|
- 3. The graduate can demonstrate how to employ mathematical knowledge.
|
- 4. The graduate can demonstrate how to communicate competently.
|
- The graduate is sensitive to issues relating to a diverse, global society.
|
COURSE CONTENT OUTLINE
- Gather information with security and network analysis applications
- Analyze information from security and network analysis applications
- Analyze vulnerabilities and recommend remediation strategies
- Configure security technologies
Primary Faculty Nabozny, Keith Secondary Faculty Associate Dean Johnson, Elise Dean Balsamo, Michael
Official Course Syllabus - Macomb Community College, 14500 E 12 Mile Road, Warren, MI 48088
Add to Favorites (opens a new window)
|
|