When is hacking legal? When you use it to secure your own network. This course will teach you readily available hacking tools and techniques to audit your network so you can locate and close security holes. In six weeks, you will discover how to better protect your system against those who wish to gain unauthorized access.
In this course, you will discover the complex method of electronic breaking and entering. You’ll learn the terms and programming behind the interaction between hardware and software when communicating through a network. Following packets of data from one point to another through an entire network, you will discover where the flaws exist for data loss and security breaches. You’ll learn about the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. Along the way, you will see how private data can quickly become public knowledge. Let this course establish the foundation of your network security. Learn how hackers think so you can harden your defenses against them!
Learn about different types of hackers, what motivates them, and when hacking is considered ethical. You will conduct a security audit on your network by trying to penetrate it just as a hacker would! Then, learn the insider techniques of how hackers gain information about business networks through preying on employees!
Discover how the search engine works and see how public and private information is stored. You will learn how hackers extract this wealth of information and how they use it against you. Then, learn how an advanced search query can turn into a useful hacking technique.
Examine the purpose, function, and communication methods of each layer within the OSI 7 Layer Network Model. Then, discover how communication between two networks takes place, and learn how you can capture packets from your network just as a hacker would.
Learn how to look for signs that your network has been exposed or penetrated. Then, examine a PC from the inside out. You will understand what ports are, where they are located, and what they do.
Learn to manage the risk involved with running certain network programs by understanding what they do, how they operate, and what you can do to keep them from exposing your network core. Then, learn all about rootkits – the malicious programs that run undetected in the background of your system.
Learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Then, get an introduction to computer forensics and learn how to become a computer investigator so that you’ll be prepared if a hacker ever violates your system.
Prerequisites / Requirements
- This course can be taken on either a PC or Mac device.
- In addition your primary computer, you will need access to one or more networked computers that do not contain any data you consider sensitive, due to performing security exercises and testing throughout the course.
- PC: Windows XP or later.
- Mac: OS X Snow Leopard 10.6 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Flash Player. Click here to download the Flash Player.
- Adobe Acrobat Reader. Click here to download the Acrobat Reader.
- Email capabilities and access to a personal email account.
- Software must be installed and fully operational before the course begins.
Completion of our online Introduction to PC Security course (or equivalent experience), or completion of Introduction to Networking course (or equivalent experience). You must be familiar with PC and networking terminology and have at least a basic knowledge of how networks function.
When can I get started?
A new session of each course opens each month, allowing you to enroll whenever your busy schedule permits.
How does it work?
Once a course session starts, two lessons will be released each week for the six-week duration of your course. You will have access to all previously released lessons until the course ends.
How long do I have to complete each lesson?
The interactive discussion area for each lesson automatically closes two weeks after each lesson is released, so you’re encouraged to complete each lesson within two weeks of its release.
What if I need an extension?
The final exam will be released on the same day as the last lesson. Once the final exam has been released, you will have two weeks plus 10 days (24 days total) to complete the final and finish any remaining lessons in your course. No further extensions can be provided beyond these 10 days.