CNIT

XML and JSON

Introduction to eXtensible Markup Language (XML) and JavaScript Object Notation
(JSON). Hands-on experience with XML documents, Document Type Definition (DTD),
namespaces, schemas, and data presentation with eXtensible Style Language (XSLT) or
Cascading Style Sheets (CSS). Introduction to JSON syntax to store and exchange data.

Internet Basics and Beginning HTML

Methods of using the Internet. History, design and protocol methods used on Internet
including: electronic mail, connection to remote computers, file transfer, World Wide
Web, basic web page creation and publishing using HTML and CSS. Additional topics
include: computer security, copyright and electronic commerce, and basic Unix shell
commands requisite to shell account use.

Securing Web Applications

This course teaches techniques used by attackers to breach Web applications and how to prevent security attacks. Topics include how to secure and manage assets such as authentication systems, access controls, databases, and back-end components, and how to protect users from attackers, including identifying common vulnerabilities in compiled code and source code.

Hacking Mobile Devices

Mobile devices run specialized operating systems with security problems. Students will learn how mobile operating systems and apps work, how to find and exploit vulnerabilities and how to defend them. Topics will include phone call, voicemail, SMS intrusion, jailbreaking, rooting, NFC attacks, mal ware, browser exploitation, and application vulnerabilities.

Exploit Development

Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems. Covers essential exploit development skills for advanced penetration testers and security professionals. Students will be required to obey high
ethical principles and not exploit systems without authorization.

Information Security Professional Practices

In-depth course in information security, including access control, application security, enterprise continuity, cryptography, technical risk management, physical security, and telecommunications and network security. This course supports preparation for the Certified Information Systems Security Professional (CISSP) credential, which is essential for high-level information security professionals.

Advanced Ethical Hacking

Advanced techniques in ethical hacking of Windows and Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, web servers, and Denial of Service attacks.