ICS 281
Ethical Hacking

Welcome to ICS 281: Ethical Hacking


This course will cover the following topics:


This course is broken up into 7 number of modules. Each module will contain videos (lecture and/or demos), readings, labs and homework assignments to complete. 


Module 0: Course Introduction

Module 1: Networking Review, skills required, what is a pentest, planning and scoping 

Module 2: Information/Enumeration Gathering

Module 3: Vulnerabilities and vulnerability scanning

Module 4: Social Engineering, System and Network Hacking, Cryptography

Module 5: Web Application Vulnerabilities, Web Apps and Web Server Hacking

Module 6: Python, Ruby, Power Shell and Bash scripting

Module 7: Reporting & Communication

Image from TestOut that shows famous hacks.






The following map is from Cyberseek. Hover over Hawaii to learn about the total job opens in our state. Though, I highly recommend visiting the site and looking at all the data they provide.