Course Code: COMP603
Learn to assess and then correct the vulnerabilities present within information systems. Explore tools and penetration testing methodologies used by ethical hackers and discover what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Methods and tools used in attacks and their countermeasures as well as available security resources and systems are investigated.
Some courses require additional textbooks and/or materials. Please visit your campus store in-person or online:
Course Cart