Course Description This course is a survey of the ethical and legal issues pertaining to security testing. It demonstrates how to use tools that can be used to gain information about a computer network, how to recognize that the tools are being used, and how to defend a network against those attacks. By successfully completing this course you will earn 3 units of college credit. ⇑ Table of Contents Course Objectives Describe the role of an ethical hacker. Test a data communications network for security vulnerabilities. Compose a certifiable security report. Compare port scanning tools for viability. Enumerate Windows OS targets and services. Develop custom software applications for security testing purposes. Analyze authentication processes for security vulnerabilities. Compare symmetric and asymmetric encryption algorithms. Describe intrusion detection and prevention systems and Web-filtering technologies. ⇑ Table of Contents Course Learning Outcomes ⇑ Table of Contents