GI 563 Vulnerability Management II 6 Cr.
This course introduces students to advanced open-source tools used to conduct penetration testing of computer networks. This is the second of two courses that address Vulnerability Management. Students learn the rules of engagement, and how to conduct legal and ethical security tests and vulnerability assessments. Students utilize a virtual lab to gain experience through hands-on lab exercises. Students learn to use the well-known open-source tools (Metasploit , John the Ripper, Wireshark) to understand security vulnerabilities and how to use this tool for penetration testing, testing the control tools and how to conduct monitoring of an enterprise. In the course students are introduced to: system security and vulnerability analysis, the most common system exploits and vulnerabilities, system “pivoting” and client-side exploits.