This course is designed to introduce the student to ethical hacking and
penetration testing using open source software. Ethical hackers are employed
by corporations for the purpose of testing their networks for weaknesses. Topics
covered in the course include industry standard tools and techniques used to
discover vulnerable and exploitable machines in a network. The student will
learn about stages of ethical hacking including reconnaissance, scanning,
enumerating, gaining access, and maintaining access. Great emphasis will be on
the legal and ethical issues related to hacking. Prerequisite: CST* 246.