WE NEED ETHICAL HACKERS IN ORDER TO LOCATE AND EXPLOIT VULNERABILITIES BEFORE BEING EXPLOITED BY THE WRONG PEOPLE. - KEREN ELAZARI, CYBERSECURITY EXPERT
Weekly Hands-On Labs
- Reset Password with Linux
- Sniff Network
- Penetration Testing
- Man In the Middle Attack
- Spoof Mac/IP address
- Risk Identification
- TrueCrypt Drive Encryption
- Linux Distros for IT Security
- Computer Forensics
In this course (Intro to Network Security), students perform weekly labs focusing on white hat (ethical) hacking skills. Lab examples are password cracking, man-in-the-middle attacks, and malicious code. Learn about how hackers think and act in order to locate and exploit vulnerabilities. This course is designed for students with no IT Security knowledge!
(Photo to right) Lisa Fiander, 20, from Perth, will join the team of ethical hackers offering affordable services to help protect companies from e-criminals and scammers.
*Over 97,000 jobs on indeed.com have "Network security" in job description. Over 3400 of those jobs are within 100 miles radius of rockford, Illinois.
* source: indeed.com