Skip to content

dthomsen116/SEC-335

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Certification of Authenticity:

I certify that this is entirely my own work, except where I have given fully-documented references to the work of others. I understand the definition and consequences of plagiarism and acknowledge that the assessor of this assignment may, for the purpose of assessing this assignment:

  • Reproduce this assignment and provide a copy to another member of academic
  • staff; and/or Communicate a copy of this assignment to a plagiarism checking
  • service (which may then retain a copy of this assignment on its database for
  • the purpose of future plagiarism checking)

Course Information

Course Name: Ethical Hacking & Penetration Testing

Course Number: SEC-335

Professor: Mackenzie Marsocci

Semester: Spring 2022

Student Name: David Thomsen

REPO Description

This course repository provides the work completed and assignments given during Ethical Hacking & Penetration Testing, taught by Professor Marsocci. It includes essential information about the course, such as its description, objectives, and required materials. Please read through this document to familiarize yourself with the course content and expectations.

Course Description

Operating Systems and Internet-based applications are common sources of security breaches. Students will learn about the information security flaws in software systems, vulnerabilities inherent in common network services, ways to secure Internet servers and services, and increasing security awareness in organizations. Students will also learn the methodologies and tools used to probe networks for vulnerabilities and propose solutions. Hands-on activities will give the necessary background to assess security. Scenarios will provide opportunities to discuss security, ethics, and incident response.

CLOs

This course will take students through the incident handling process. Today’s organizations require skilled first responders that are properly trained in the preparation, identification, containment, eradication, and being able to take the lessons learned from those steps to prevent or minimize the impact of a similar security incident.

  • Describe ways to incorporate security into the design of software systems and Web server and e-commerce applications.
  • Determine the security vulnerabilities of various software tools, various Web (and other) server applications software and design mechanisms to mitigate those vulnerabilities.
  • Articulate the findings of vulnerabilities in a system and how to fix the vulnerabilities.
  • Describe the process for maintaining secure software and Internet server systems.
  • Apply best information security practices for software systems to the specific needs of an organization.
  • Select the optimal tools for implementing software systems and server-based Internet applications given project constraints.
  • Document the impact and management of secure software and server systems, and the impact on the organization, for both professional peers and managers.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages