cyb233 | undergraduate

Ethical Hacking Part 3

Explore by:

or call us at



This course provides training on penetration testing. Introduced topics include SQL Injection, Hacking Wireless Networks, Hacking Mobile Platforms, Evading IDS, Firewalls, and Honeypots, Cloud Computing, and Cryptography.

This undergraduate-level course is 5 weeks This course is available to take individually or To enroll, speak with an Enrollment Representative.

Course details:

Credits: 3
Continuing education units: XX
Professional development units: XX
Duration: 5 weeks

topic title goes here

    SQL Injection: Concepts, Attacks, and Countermeasures

    • Choose appropriate SQL injection countermeasures.
    • Apply SQL injection concepts.
    • Discuss types of SQL injection attacks.
    • Employ SQL attack techniques.

    Protecting and Managing Wireless and Mobile Networks

    • Differentiate the strengths and weaknesses of modern day wireless encryption algorithms.
    • Relate the methods used for hacking wireless networks to cybersecurity.
    • Compare mobile device attack vectors.
    • Outline a mobile device management plan.

    System Defense: Firewalls, Intrusion Detection Systems, and Honeypots

    • Use firewall evasion tools and techniques.
    • Relate the employment of firewalls, intrusion detection systems (IDS), and honeypots to the support of defense-in-depth.
    • Illustrate how penetration-testing process identifies and evades network defenses.
    • Select perimeter protection evasion and appropriate countermeasures for a defense-in depth strategy.

    Cloud Computing: Considering Threats and Analyzing Security Tools

    • Outline the considerations in formulating a cloud security plan.
    • Prioritize cloud security threats and attacks.
    • Analyze available cloud security tools.

    Encryption and Cryptanalysis for Cybersecurity and Cryptographic Attack Defense

    • Summarize use of modern encryption algorithms in cybersecurity.
    • Identify the role of cryptanalysis in an organization’s cyber security.
    • Analyze the security features and use of a public key infrastructure.
    • Appraise cryptographic attack scenarios for use in cybersecurity.
    Tuition for individual courses varies. For more information, please call or chat live with an Enrollment Representative.

    Please ask about these special rates:

    Teacher Rate: For some courses, special tuition rates are available for current, certified P-12 teachers and administrators. Please speak with an Enrollment Representative today for more details.

    Military Rate: For some courses, special tuition rates are available for active duty military members and their spouses. Please speak with an Enrollment Representative today for more details.

    The University of Phoenix reserves the right to modify courses.

    While widely available, not all programs are available in all locations or in both online and on-campus formats. Please check with a University Enrollment Representative.

    Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.