The Hacking Basics course offers the following:
The Hacking Basics course presents the various ways hackers can penetrate computer network systems and methods to confront such attacks. This course specifically presents the various ways that a cyber criminal or hacker attempts to penetrate and infect a computer network or personal handheld device in order to steal information, ask for ransom, disable, or control a device. Beyond learning the most common cyber attacks and techniques, the course also presents preventive measure and actions a person can take to protect and defend themselves from a cyber attacker.
The lessons learned through this course expose students to the do's and don'ts of daily computer use and ways to protect from cyber theft. These are lessons that protect students from identity theft, monetary theft, and information/data theft that serve a benefit for the long-term use of computers and the Internet.
The Hacking Basics course is a basic introductory course for students interested in learning the techniques of how a hacker penetrates a web server, network, or computer in order to provide a broad understanding on how to defend against these types of cyber attacks.
Note: The Hacking Basics Course requires additional materials. This includes the textbook, which is used in all three cybersecurity courses. This textbook is ordered separately and is not included as part of the course.
History of Attacks
Types of Hackers
Types of Attacks
History of Hacking
Stages of Reconnaissance
Points of Entry
Common Exploitation Tools