Sorry, no results were found. Please check back later.
Introduces the techniques hackers use to discover vulnerabilities. Students will learn ways to tighten the network security to protect the exposed data from the discovered vulnerabilities. Focus is on penetration-testing tools and techniques that security testers and ethical hackers use to protect computer networks.
Examines the basics of information security, including access control and organizational security policies. This course will include the process of securing user workstations, laptops and mobile devices.
Covers Basic Linux topics including operating system basics, file management, graphic user interfaces and the command line interface.
Provides an introduction to networking theory and technologies, including the basics of communication, common protocols, the OSI model, network topologies, local network media, network devices, network security and networking tools. Includes more in-depth study of the components of TCP/IP, Ethernet, and wireless networks. Involves considerable time developing troubleshooting skills.
Covers Microsoft Windows Server 2016 administration including server hardware and software, Active Directory, file resources, printers, disk resources, Web resources, DNS and DHCP. Monitoring and troubleshooting server resources are also examined. Extensive hands-on activities are included.