Ethical Hacking Part 1
Start when you're ready
Choose an upcoming start date:
Please Note: Attendance and participation are mandatory in all University courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
University of Phoenix reserves the right to modify courses. While widely available, not all programs are available to residents of all states. Please check with a University Enrollment Representative.
Ethical Hacking Part 1
Course level: Undergraduate
This course provides training on penetration testing. Introduced topics include Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks, Enumeration, System Hacking, and Malware Threats.
What you'll learn
Course skills and outcomes
- Define ethical hacking, its scope, and goals within an ethical framework.
- Describe vulnerability assessment and the significance of penetration testing.
- Define footprinting and reconnaissance, its scope, and methodology.
- Determine appropriate process for footprinting and reconnaissance.
- Conduct footprinting/reconnaissance using recognized tools and techniques.
- Identify the role of scanning in vulnerability analysis.
- Differentiate scanning techniques and their appropriate tools.
- Draw the network topology based on scanning results.
- Evaluate strategies for scanning countermeasures and evasion.
- Identify the role of enumeration in vulnerability analysis.
- Detail enumeration techniques and their appropriate tools.
- Summarize enumeration countermeasures.
- Conduct appropriate steps for enumeration for use in attack planning.
- Explain ethical system hacking methodology, the stages of system hacking and their goals.
- Determine appropriate ethical hacking techniques and tools for cracking passwords, escalating privileges, and executing applications.
- Select ethical hacking techniques and tools appropriate for hiding files and covering tracks.
- Outline components of an attack plan.
- Outline a penetration testing plan.
- Compare different types of malware.
- Explain malware analysis process.
- Describe techniques and tools to detect malware.
- Evaluate malware countermeasures.