General Catalog 2025-2026

CYSC 4100 Ethical Hacking

Application of the tools and techniques associated with the cybersecurity practice known as ethical hacking or penetration testing. It includes laws and regulations, steps in penetration testing such as planning, scanning, exploitation, and reporting of results. Emphasis on the identification of system vulnerabilities to avoid them and how to solve this problem. It introduces the design of controls to prevent future attacks in real life situations. Includes penetration testing methods and tools. It requires 30 hours of lecture and 30 hours of closed laboratory.

Credits

3

Prerequisite

CYSC 1000, COMP 3015 and COTN 2230.