Information Technology

The Non-Credit Computer Education Department delivers basic and advanced technology training leading to employment, and for personal enrichment. 

CompTIA, Cisco, Cybersecurity, Open Technologies Professional Skills Development (1 to 3-day classes)
Office Technology Software Programming
Accounting Technology Web Design and Development
Drafting and Computer-Aided Design (CAD) Database Administration

Course Details & Registration Information

Course
Advanced PC Security
Name
NOS-3100GE
Available Classes
    Section Location Begin Date End Date Instructor Price Seats Available/Total Seats
200805 Online 09/12/2018 11/02/2018 EDUCATION TO GO $70.00 19/20
Description Course Outline Requirements Intended Audience More Details
Description
When is hacking legal? When you use it to secure your own network. This new method of hacking, called ethical hacking or white-hat hacking, uses common and readily-available tools and techniques to audit your network so you can locate and close security holes. Whether you're running a small home network or you’re an enterprise network administrator, this course will teach you how to better protect your system against those who wish to gain unauthorized access.
Course Objectives
  1. have gained an understanding of the complex method of electronic breaking and entering.
  2. have learned the terms and programming behind the interaction between hardware and software when communicating through a network.
  3. have discovered the role of the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission.
Outline of Instruction
  1. Wednesday - Lesson 01

    If you've ever wondered about the different types of hackers, what motivates them, and when hacking is considered ethical, this lesson answers these questions and more! You'll learn about the white-, black-, and gray-hat hackers, why they hack, the methods they use, and the ethics of computing and hacking. You'll also get your feet wet by learning how to conduct a security audit on your network by trying to penetrate it just as a hacker would!
  2. Friday - Lesson 02

    This is the lesson where you'll learn about people hacking! Social engineering is the official term for the physical and psychological methods hackers use to gain entry to your system. Intrigued? Good. Get ready to learn the insider techniques of how hackers gain information about your networks through preying on the weakest link in any organization—its employees!
  3. Wednesday - Lesson 03

    If you've ever used the Google search engine to find information on the Internet, you know how powerful it is. Hackers know this too, and they have found a way to use the built-in power of Google to gather information about your network! By learning how the search engine works, you'll see why and how Google stores so much public and private information. Then, you'll learn how hackers extract this wealth of information and how they use it against you.
  4. Friday - Lesson 04

    In this lesson, you'll learn advanced Google hacking techniques so that you can perform a Google hack for your security audit. Get a full list of advanced hacking operators and discover—in depth—the advanced method of querying Google. Through a step-by-step example, you'll see how a search query is performed and what results look like. And of course, you'll learn how to incorporate this hacking method into your own security audit!
  5. Wednesday - Lesson 05

    Have you ever wondered what really goes on within your network? The OSI 7 Layer Network Model is the standard on which networks are built, so in order to fully understand how networks are hacked, you need to understand this model. But have no fear! You'll learn the purpose, function, and communication methods of each layer within the model. And I assure you it will be painless!
  6. Friday - Lesson 06

    Have you ever wanted to see what kind of information your network is sending out into cyberspace? Well, it's all in the packets. Once you understand the OSI 7 Layer Network Model, you can now understand packets that travel across a network. It's in those packets that hackers can gain the most information about your network. You'll learn how communication between two networks takes place—from the initial handshake to the termination of the connection—and how you can capture packets from your network just as a hacker would.
  7. Wednesday - Lesson 07

    Now that you've learned how a hacker scouts out your network and gains information, it would be nice to know from what direction they'll attack you from, won't it? Learn how to look for signs that your network has been exposed or penetrated. By understanding the levels of security, from vulnerability through exposure, you'll view a hack through the eyes of a real hacker.
  8. Friday - Lesson 08

    We all know that common ports connect printers, USB devices, and the like. But, did you know that there are also ports hidden inside your computer? And more importantly, do you know how these hidden ports can endanger you if they are left exposed on your network? In this lesson, we'll look at a PC from the inside out. This lavishly illustrated lesson will help you understand what ports are, where they are located, and what they do. Then, it's a short step to understanding how leaving these ports open can result in a hacker learning the services and software running on your network.
  9. Wednesday - Lesson 09

    While the term necessary evil is a cliché, we do have a few necessary evils in the computing world. In order to make networks function, sometimes we need to run programs that might not be good for our security. You'll need to learn to manage the risk involved with running these services by understanding what they do, how they operate, and what you can do to keep them from exposing your network core.
  10. Friday - Lesson 10

    Get ready to learn about rootkits in this information-packed lesson! A hacker's best friend, these malicious programs run undetected in the background of your system, launching malicious attacks, sometimes even without your knowledge. It's both hard to find and hard to get rid of rootkits, so for the sake of your PC's security, get ready to apply this lesson today!
  11. Wednesday - Lesson 11

    Have you ever analyzed your risk? In this lesson, you'll learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Hand in hand with the analysis is your audit plan, where you can probe your computer or network for the weakest links. And then, we'll talk about what to do once you've found them.
  12. Friday - Lesson 12

    If you like forensics television shows like CSI, this lesson is for you. No PC security course could be complete without an introduction to computer forensics, which is a precise science used to contain security breaches and minimize loss in the event of an attack. Learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.
Contact Hours
24
CEU's
2.4
Industry Standard, State, or National Certification
No
CE to CU Articulation
No
Prerequisites
Completion of Debbie Mahler's online Introduction to PC Security course (or equivalent experience), or completion of David Iseminger's online Introduction to Networking course (or equivalent experience). You must be familiar with PC and networking terminology and have at least a basic knowledge of how networks function. You will also need access to one or more networked computers that do not contain any data you consider sensitive.
Text and Supplies Needed
Internet access
• Email
• One of the following browsers:
o Mozilla Firefox
o Microsoft Internet Explorer (9.0 or above)
o Google Chrome
o Safari
• Adobe PDF plug-in (a free download obtained at Adobe.com .)
Clinical Site/Special Facilities
Requirements for Successful Completion of this Course
  1. Attendance 80% or above
  2. Participation
  3. Students must make 70% or better on 10 quizzes or 70% or better on the final exam.
Accreditation/Special Approval Requirements
Intended Audience
Specific Industry or Business Support Needs
Industry or Job Titles Related to training Outcomes for Employment
Related Courses
Course Contact Information
Non-Credit Online Learning http://ceonline.waketech.edu
919-532-5818 or 919-532-5689