Network Exploits, Vulnerabilities and Penetration Testing (ITOP 2415)
This course introduces students to the art of ethical hacking and security testing. The course covers the legality of ethical hacking, TCP/IP, malicious software, security attacks, enumeration, programming concepts, vulnerabilities of operating systems, cryptography basics and network protection systems. Students will learn up-to-date techniques in protecting and defending their networks for internal and external intruders. Students will work in groups to find vulnerabilities in the network and try to exploit that vulnerability using various hacking tools.
Course code: ITOP 2415
Credits: 4.5
Tuition: $0
Length: 72.0 hours
Course outline:
view
https://www.vcc.ca/vccphp/courseoutline?subject=ITOP&number=2415
Prerequisites
ITOP 2411; ITOP 2204. No schedule is currently available. Please check again later.
0
Schedule †
ITOP 2415 schedule for programs:
- CS
Course dates and times may vary throughout the term. Select the CRN number below to see a full schedule.
CRN # | Dates | Day/Time/Location | Instructor | Register |
---|---|---|---|---|
12037 | January 7, 2025 to March 27, 2025 | See full schedule Delivery: Blended Location: Varies | Okpongete, Faith | |
12060 | January 8, 2025 to March 27, 2025 | See full schedule Delivery: Blended Location: Varies | Okpongete, Faith |
Additional Information
- Introduction to Ethical Hacking
Overview of TCP/IP, IP Addressing, numbering system
Malicious software and malware/intruder attacks
Addressing physical security
Using web tools for footprinting
Conducting competitive intelligence
Using DNS zone transfers
Social engineering
Port scanning and tools, and ping sweeps
Understanding scripting
Enumeration - Windows and Unix-like OS
Programming concepts
Vulnerabilities (OS/web-applications) and tools for identification
Hardening an OS
Tools for web attackers and security testers
Wireless technologies, authentication, war driving and wireless hacking
Cryptography basics, algorithms, PKI, and attacks
Routers, firewalls, IDS, IPS, and honeypots
Security devices
Trivial File Transfer Protocol (TFTP) server
Password and hashcat cracking
Vulnerability testing
Password recovery
Social-Engineer Toolkit
Penetration testing, remediation, and reporting
Metasploit framework
Attacker techniques and methodologies
Please see Program Content Guide.
This course is offered as part of a VCC program only.
* The amount shown is the approximate cost of tuition (for courses with tuition) or fees (for courses that do not have tuition).
Tuition and Fees are approximate and subject to change. Students are required to pay any applicable fee increases. Fees listed are for domestic students. For international programs, visit VCC International.
† This information is intended as a guideline only. Program and course details are subject to change with the approval of VCC's Board of Governors.