ICS 281
Ethical Hacking
Welcome to ICS 281: Ethical Hacking
This course will cover the following topics:
What is Penetration Testing
Planning and Scoping a Pentest
Information/Enumeration Gathering
Social Engineering
Vulnerabilities and Vulnerability Scanning
System Hacking (Windows & Linux)
Network Hacking
Web Apps and Web Server Hacking
Coding for Ethical Hackers
Reporting
This course is broken up into 7 number of modules. Each module will contain videos (lecture and/or demos), readings, labs and homework assignments to complete.
Module 0: Course Introduction
Module 1: Networking Review, skills required, what is a pentest, planning and scoping
Module 2: Information/Enumeration Gathering
Module 3: Vulnerabilities and vulnerability scanning
Module 4: Social Engineering, System and Network Hacking, Cryptography
Module 5: Web Application Vulnerabilities, Web Apps and Web Server Hacking
Module 6: Python, Ruby, Power Shell and Bash scripting
Module 7: Reporting & Communication
The following map is from Cyberseek. Hover over Hawaii to learn about the total job opens in our state. Though, I highly recommend visiting the site and looking at all the data they provide.