The aim of this course is to learn how to determine potential online criminal activity at its inception, legally gather evidence, search and investigate wireless attacks. Students understand ethical approaches of operating with technology to search out weakness of a system taking it to future level for more development. The course discusses interactive setting wherever the students can learn the aptitudes of activity vulnerability assessment, pen-testing of systems and networks, repairing the weaknesses, creating reports of scanned vulnerabilities.
Course ID: CYS 529
Credit hours | Theory | Practical | Laboratory | Lecture | Studio | Contact hours | Pre-requisite | 3 | - | - |
---|