ID
7212

Introduction to Networks

This course will teach the skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. Follows objectives of CompTIA Network+ certification exam.

Computer Forensics

Forensics tools, methods and procedures for investigating computers. Data recovery techniques and evidence collection, protection of evidence, expert witness skills and computer crime investigation techniques. Analysis of various file systems and specialized diagnostic software to retrieve data. Prepares in part for CompTIA Security+ and maps to Computer Investigation Specialists exam.

Introduction to History, Culture and Practices of Making

Introduction to the Maker Movement, a survey of cultures, disciplines, materials, and technologies related to the traditions of making through time and around the world. Students will recognize key materials and techniques of disciplines including the arts, construction, engineering, and computer science to critically analyze and apply ways of creating that support an understanding of culturally significant work of diverse peoples and eras.

Advanced Ethical Hacking

Advanced techniques in ethical hacking of Windows and Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, web servers, and Denial of Service attacks.

XML and JSON

Introduction to eXtensible Markup Language (XML) and JavaScript Object Notation (JSON). Hands-on experience with XML documents, Document Type Definition (DTD), namespaces, schemas, and data presentation with eXtensible Style Language (XSLT) or Cascading Style Sheets (CSS). Introduction to JSON syntax to store and exchange data.

Exploit Development

Learn how to find vulnerabilities and exploit them to gain control of target systems including operating systems. Covers essential exploit development skills for advanced penetration testers and security professionals. Students will be required to obey high ethical principles and not exploit systems without authorization.