Program Number:
10-151-2
Course Number:
151-125
Credits:
3.00
In this course, learners examine various techniques used by security personnel and hackers to analyze system vulnerabilities. Leaners explore techniques to defend systems, investigate system configurations, and examine methods to infiltrate and/or block potential breaches. Upon completion of the course, learners will be able to explain the tools and techniques commonly used for detecting cyber threats and document and report findings using an industry-standard format.