Kent Backman's expertise is in intrusion analysis, network vulnerability assessment, and opensource solution engineering. His interest and skill in ethical hacking developed while managing Web servers for Fortune 500 companies. An analyst for many security incident response teams, Kent spent several years in Baghdad as part of the advisory team to the Iraq Ministry of Defense, specializing in network security and Linux engineering. He holds RHCT, MCSA, CISSP, and CEH certifications and is a network security consultant in Honolulu.
Hands-On Ethical Hacking and Network Defense
This course introduces ethics, laws, metrics, methodologies, project management, tools, techniques, purposes, and practices of penetration testing a.k.a. ethical hacking, as a proactive measure to improving the overall security posture of a system or network. Students will learn to assess target systems and networks for vulnerabilities and exploits, detect security threats, and recommend and implement defensive, corrective, and preventative measures based on penetration test results.
Simpson, M. T., Backman, K., & Corley, J. E. (2012). Hands-on ethical hacking and network defense. Boston, MA: Course Technology PTR. Retrieved from = =true&db=nlebk&AN=450305&site=eds-live&scope=site&ebv=EB&ppid=pp_45
Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Northern runs a cyber lab where you will learn to apply cybersecurity skills in a hands-on environment. You learn computer networking using the same equipment that networking professionals install in large enterprises. The cyber lab also houses a private cloud infrastructure that lets you perform ethical hacking on systems designed to replicate real-world business systems. You'll learn to think like a hacker so that you can better protect against them.
A minor in cyber defense will help you learn fundamental computer networking skills, understand how complex information systems work, and how to protect individuals and organizations from criminals. No prior experience with computer classes is expected.
The minor starts with basic computer concepts and ends with advanced cyber defense skills such as ethical hacking. The minor is often chosen by Mobile and Web App Development majors and other technical majors, but humanities students have also been successful.
Increased cybersecurity threats and new homeland security policies have produced a growing national demand for cybersecurity professionals with knowledge of cybersecurity, ethical hacking, intrusion testing, vulnerability assessment, and computer forensics. In addition, the growth of universal and mobile computing require new approaches to information security and the protection of information systems from unauthorized access, modification, or destruction. The Cybersecurity and Computer Forensics program prepares students for entry level employment in cybersecurity and computer forensics careers including cyber incident and response, vulnerability detection and assessment analyst, computer forensic analyst, and computer forensics investigator. Foundation courses introduce students to the legal, ethical, and theoretical issues in cybersecurity and computer forensics technology. Core courses expand student depth and skills in ethical hacking, criminal justice, evidentiary analysis, and the development of a forensically sound environment. Capstone courses provide practicum experience and opportunity to participate in the Collegiate Cyber Defense Competition (CCDC). Successful completion of this program leads to an Associate in Applied Science (AAS) degree Cybersecurity and Computer Forensics. Students are required to have access to computer, internet, and browser.
This course is an introduction to technologies, terminology, and skills used in the world of data networking. Emphasis is on practical applications of networking and computer technology to real-world problems, including home and small-business network setup. You will perform a variety of hands-on and case project activities combined with your reading activities that will reinforce each of the course objectives. This course maps to CTCITC 115: Introduction to Networking. This class may include students from multiple sections.
This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), apply these concepts to computer networks, and amplify the theory with hands-on aspects of configuring and using secure networks. Topics include: review of networking concepts, general security concepts, user authentication and authorization, encryption, network attacks (including hacking, viruses, worms and denial of service) and network protection. Defense tools including firewalls, Virtual Private Networks (VPNs), and filters will be discussed in depth, as they relate to effective and safe e-commerce and other applications in the real world. Case studies along with projects will be assigned and performed.
CEH v11 (Certified Ethical Hacker) training and certification boot camp will immerse the studentsinto a hands-on environment where they will be shown how to conduct ethical hacking. Theywill be exposed to an entirely different way of achieving optimal information security posture intheir organization; by hacking it! They will scan, test, hack and secure their own systems. Thelab intensive environment gives each student in-depth knowledge and practical experience withthe current essential security systems. Students will begin by understanding how perimeterdefenses work and then be lead into scanning and attacking their own networks. Students thenlearn how intruders escalate privileges and what steps can be taken to secure a system. All ofthis will be done without harming any real network. Students will also learn about IntrusionDetection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and VirusCreation. When a student leaves this intensive 5 day class they will have hands onunderstanding and experience in Ethical Hacking. This course prepares you for EC-CouncilCertified Ethical Hacker v9 exam 312-5 2ff7e9595c
Comments