Course Details
Course Code: ISSC262 Course ID: 5165 Credit Hours: 3 Level: Undergraduate
This course examines the techniques and technologies for penetration of networks, detection of attacks, and prevention of attacks. This course addresses the techniques, the technologies, and the methodologies used by cyber intruders (hackers) to select a target and launch an attack. Students will gain insight into the motives and desired goals of hackers as well as effective tools and techniques used as countermeasures ensuring data assets remain secure. This course focuses on techniques and technologies to detect such attacks even while the attack is in progress; early detection enables the administrator to track the movements of the hacker and to discover the intent and goals of the hacker. This course assesses the various countermeasures to keep the system out of the “sights” of the hacker and to keep the hacker out of the perimeter of the target network. This course also explores the laws and the legal considerations in prosecuting computer crime.
Course Schedule
Registration Dates | Course Dates | Start Month | Session | Weeks |
---|---|---|---|---|
Registration11/28/2024 - 05/02/2025 | Course Dates05/05/2025 - 06/29/2025 | Start Month May | SessionSpring 2025 Session I | Weeks8 Week session |
Registration12/30/2024 - 05/30/2025 | Course Dates06/02/2025 - 07/27/2025 | Start Month June | SessionSpring 2025 Session D | Weeks8 Week session |
Registration01/27/2025 - 07/04/2025 | Course Dates07/07/2025 - 08/31/2025 | Start Month July | SessionSummer 2025 Session B | Weeks8 Week session |
Registration02/24/2025 - 08/01/2025 | Course Dates08/04/2025 - 09/28/2025 | Start Month August | SessionSummer 2025 Session I | Weeks8 Week session |
Registration03/31/2025 - 08/29/2025 | Course Dates09/01/2025 - 10/26/2025 | Start Month September | SessionSummer 2025 Session D | Weeks8 Week session |