The CIM Courses system will be down temporarily undergoing routine maintenance.
May 25, 2016 by Sara Hooshangi (shoosh)
PSCS 4204 : Computer Network Attack and Exploitation
Wed, 25 May 2016 08:46:57 GMT
Mon, 04 Jan 2016 15:29:44 GMT
Catalog Pages referencing this course
Cybersecurity Strategy and Information Management (PSCS)
Master of Professional Studies in the Field of Cybersecurity Strategy and Information Management
Programs referencing this course
CACTA-UC: Cyber Attacks and Cyber Threats Analysis
College of Professional Studies
Prof Studies-Cybersecurity (PSCS)
Long Course Title
Computer Network Attack and Exploitation
Short Course Title
Comp Net Attack & Exploitation
Number of Credits
Default Grading Method
Repeatable for Credit?
Frequency of Offering
Are there Course Equivalents?
Are Fees Applicable?
Explanation and Description of Fees
Are Additional Resources Required?
Explanation of Additional Resources
Justification for Additional Resources
Describe any Sources of Additional Funding
Cyber attacks orchestrated by computer networks to distract, deny, degrade, or destroy other computer networks or information within large computer systems. Developing standardized attack scenarios to be used against specific targets and providing operational planning to conduct network attacks.
- Understand the responsibilities and liabilities of ethical hacking - Penetrate secure computer networks - Exploit secure computer systems - Document and analyze results of penetration operations - Provide critics and recommendations to improve existing security measures
Uploaded a Course Syllabus
Explanation of how the course differs from similar GW courses
Course Reviewer Comments
Wed, 25 Feb 2015 17:31:36 GMT
Rollback: Per your request