Computer Science 321: Ethical Hacking

Study.com advisor image
Questions about online credit?
Study.com Advisors are available.
Call us or request info by email.

Course Summary

Computer Science 321: Ethical Hacking has been evaluated and recommended for 3 semester hours and may be transferred to over 2,000 colleges and universities. With this self-paced course, you get engaging lessons, expert instructors who make even the most challenging computer science topics simple, and an excellent resource for getting a head start on your degree.
Create an account
to start this course today
Try it risk-free for 30 days
Create an account
Try it risk-free for 30 days

12 chapters in Computer Science 321: Ethical Hacking

Course Practice Test

Check your knowledge of this course with a 50-question practice test.
  • Comprehensive test covering all topics
  • Detailed video explanations for wrong answers
Week {{::cp.getGoalWeekForTopic(0, 12)}}
Ch 1. Introduction to Ethical Hacking {{cp.topicAssetIdToProgress[625037].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Required Assignments Reminder for Ethical Hacking
Lesson 2 - What is Ethical Hacking? - Definition, History & Examples Score: {{cp.lessonAssetIdToProgress[625039].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625039].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625039].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625039].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - What is Cybercrime? - Definition, History, Types & Laws Score: {{cp.lessonAssetIdToProgress[19397].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[19397].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[19397].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[19397].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - What is Computer Hacking? - Definition, Prevention & History Score: {{cp.lessonAssetIdToProgress[357601].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357601].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357601].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357601].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - What is a Hacker? - Definition & Overview Score: {{cp.lessonAssetIdToProgress[10462].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10462].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[10462].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10462].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - What is Software Testing? - Best Practices & Methods Score: {{cp.lessonAssetIdToProgress[146718].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[146718].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[146718].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[146718].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - The Role of Software Testing in Cybercrime Score: {{cp.lessonAssetIdToProgress[490981].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490981].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[490981].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490981].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - Modes of Ethical Hacking: Probes, Analysis & Attacks Score: {{cp.lessonAssetIdToProgress[625041].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625041].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625041].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625041].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - What is Cryptography? - Definition & Uses Score: {{cp.lessonAssetIdToProgress[490967].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490967].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[490967].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490967].bestScoreQuestions}}  Take Quiz Optional
Lesson 10 - What is Encryption? - Definition, Types & Methods Score: {{cp.lessonAssetIdToProgress[10454].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10454].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[10454].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10454].bestScoreQuestions}}  Take Quiz Optional
Lesson 11 - Law Enforcement, Cryptography & Cybercrime Score: {{cp.lessonAssetIdToProgress[490969].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490969].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[490969].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490969].bestScoreQuestions}}  Take Quiz Optional
Lesson 12 - Symmetric & Asymmetric Keyed Cryptosystems Score: {{cp.lessonAssetIdToProgress[504063].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[504063].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[504063].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[504063].bestScoreQuestions}}  Take Quiz Optional
Lesson 13 - Hashing vs. Encryption Score: {{cp.lessonAssetIdToProgress[199879].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199879].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[199879].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199879].bestScoreQuestions}}  Take Quiz Optional
Lesson 14 - Cybersecurity Vulnerabilities: Definition & Types Score: {{cp.lessonAssetIdToProgress[503999].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[503999].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[503999].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[503999].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(1, 12)}}
Ch 2. Foundations of Hacking {{cp.topicAssetIdToProgress[625043].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Detecting Network & Port Scans: Significance & Methods Score: {{cp.lessonAssetIdToProgress[588545].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[588545].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[588545].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[588545].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - What is Privilege Escalation? Score: {{cp.lessonAssetIdToProgress[357565].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357565].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357565].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357565].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - NIST Special Publication 800 Series: Definition & Purpose Score: {{cp.lessonAssetIdToProgress[603865].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[603865].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[603865].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[603865].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - Operationally Critical Threat, Asset & Vulnerability Evaluation (OCTAVE): Definition & Overview Score: {{cp.lessonAssetIdToProgress[625045].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625045].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625045].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625045].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - Open Source Security Testing Methodology Manual (OSSTMM): Definition & Overview Score: {{cp.lessonAssetIdToProgress[625047].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625047].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625047].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625047].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - What is Communication Protocol? - TCP/IP & Explanation Score: {{cp.lessonAssetIdToProgress[6381].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[6381].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[6381].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[6381].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - Layers in the TCP/IP Network Stack: Function & Purpose Score: {{cp.lessonAssetIdToProgress[576457].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[576457].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[576457].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[576457].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - Transport Layer of the OSI Model: Functions, Security & Protocol Score: {{cp.lessonAssetIdToProgress[9287].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[9287].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[9287].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[9287].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - Application Layer of the OSI Model: Definition, Functions & Protocols Score: {{cp.lessonAssetIdToProgress[9288].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[9288].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[9288].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[9288].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(2, 12)}}
Ch 3. Footprinting & Social Engineering {{cp.topicAssetIdToProgress[625049].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - What is Footprinting? - Definition, Uses & Process Score: {{cp.lessonAssetIdToProgress[625051].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625051].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625051].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625051].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - The Seven-Step Information Gathering Process in Ethical Hacking Score: {{cp.lessonAssetIdToProgress[625053].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625053].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625053].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625053].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Competitive Intelligence for SEO Score: {{cp.lessonAssetIdToProgress[166275].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[166275].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[166275].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[166275].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - What is Social Engineering? - Definition, Types & Threats Score: {{cp.lessonAssetIdToProgress[490925].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490925].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[490925].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490925].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - Attacks in Digital Crime: Definition, Types & Vulnerability Score: {{cp.lessonAssetIdToProgress[504001].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[504001].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[504001].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[504001].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - Social Media: Threats, Risks & Security Score: {{cp.lessonAssetIdToProgress[357557].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357557].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357557].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357557].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - Personnel Security Policy: Definition & Examples Score: {{cp.lessonAssetIdToProgress[601135].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[601135].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[601135].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[601135].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(3, 12)}}
Ch 4. Port Scanning in Ethical Hacking {{cp.topicAssetIdToProgress[625055].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - What is Port Scanning? - Definition, Types & Tools Score: {{cp.lessonAssetIdToProgress[625057].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625057].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625057].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625057].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - What is a Network Scanner? - Definition & Use Score: {{cp.lessonAssetIdToProgress[504017].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[504017].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[504017].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[504017].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Using Traceroutes to Determine Network Range: Definition & Example Score: {{cp.lessonAssetIdToProgress[625059].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625059].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625059].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625059].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - Ping Sweeps: Definition, Tools & Uses Score: {{cp.lessonAssetIdToProgress[625061].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625061].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625061].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625061].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - The UDP Protocol: Characteristics & Structure Score: {{cp.lessonAssetIdToProgress[486243].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[486243].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[486243].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[486243].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - OS Fingerprinting: Active & Passive Fingerprinting Score: {{cp.lessonAssetIdToProgress[625063].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625063].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625063].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625063].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - How to Identify Ports & Access Points: Explanation & Tools Score: {{cp.lessonAssetIdToProgress[625065].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625065].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625065].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625065].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - How Cybercrime Prevention Tools are Used to Commit Cybercrime Score: {{cp.lessonAssetIdToProgress[490943].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490943].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[490943].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490943].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - Network Mapping & the Attack Surface: Definition, Tools & Types Score: {{cp.lessonAssetIdToProgress[625067].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625067].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625067].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625067].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(4, 12)}}
Ch 5. Enumeration & System Hacking {{cp.topicAssetIdToProgress[625069].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Enumeration in Cybersecurity: Definition, Types & Uses Score: {{cp.lessonAssetIdToProgress[625071].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625071].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625071].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625071].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - Security for User Access in Operating Systems Score: {{cp.lessonAssetIdToProgress[465081].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[465081].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[465081].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[465081].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Session Layer of the OSI Model: Functions, Protocols & Examples Score: {{cp.lessonAssetIdToProgress[9279].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[9279].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[9279].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[9279].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - Network Node: Analysis, Management & Monitoring Tools Score: {{cp.lessonAssetIdToProgress[439711].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[439711].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[439711].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[439711].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - What is System Hacking? - Definition, Types & Process Score: {{cp.lessonAssetIdToProgress[625073].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625073].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625073].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625073].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - Forensic Use of Password Crackers for Investigating Digital Crime Score: {{cp.lessonAssetIdToProgress[503981].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[503981].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[503981].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[503981].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - Types of Attacks in Network Security Score: {{cp.lessonAssetIdToProgress[219353].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219353].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219353].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219353].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - Exploiting & Defending Against System Vulnerabilities in Windows & Linux OS Score: {{cp.lessonAssetIdToProgress[625075].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625075].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625075].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625075].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - File Systems: FAT, NTFS, and HFS+ Score: {{cp.lessonAssetIdToProgress[13971].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[13971].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[13971].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[13971].bestScoreQuestions}}  Take Quiz Optional
Lesson 10 - Preventing Privilege Escalation Score: {{cp.lessonAssetIdToProgress[357563].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357563].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357563].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357563].bestScoreQuestions}}  Take Quiz Optional
Lesson 11 - Authenticating & Adding Users in Linux Score: {{cp.lessonAssetIdToProgress[572881].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[572881].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[572881].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[572881].bestScoreQuestions}}  Take Quiz Optional
Lesson 12 - How System Attackers Use Rootkits: Definition & Importance Score: {{cp.lessonAssetIdToProgress[625077].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625077].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625077].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625077].bestScoreQuestions}}  Take Quiz Optional
Lesson 13 - Required Assignments Reminder
Week {{::cp.getGoalWeekForTopic(5, 12)}}
Ch 6. Web Servers & Database Attacks {{cp.topicAssetIdToProgress[625079].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Vulnerabilities & Issues in Web Servers Score: {{cp.lessonAssetIdToProgress[625081].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625081].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625081].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625081].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - Web Application Hacking: Vulnerabilities & Attacks Score: {{cp.lessonAssetIdToProgress[625083].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625083].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625083].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625083].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Web Scripting: Client-Side and Server-Side Score: {{cp.lessonAssetIdToProgress[14061].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[14061].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[14061].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[14061].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - Threat Modeling: Process, Tools & Example Score: {{cp.lessonAssetIdToProgress[199825].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199825].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[199825].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199825].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - Database Hacking: Attack Types & Defenses Score: {{cp.lessonAssetIdToProgress[625085].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625085].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625085].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625085].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - Data Breaches: Protection & Prevention Score: {{cp.lessonAssetIdToProgress[199849].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199849].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[199849].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199849].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - Database Security Management Score: {{cp.lessonAssetIdToProgress[199789].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199789].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[199789].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199789].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - What is SQL Injection? - Example & Prevention Score: {{cp.lessonAssetIdToProgress[215565].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[215565].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[215565].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[215565].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - How to Prevent SQL Injection Attacks Score: {{cp.lessonAssetIdToProgress[357581].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357581].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357581].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357581].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(6, 12)}}
Ch 7. Wireless Vulnerabilities & Cloud Security {{cp.topicAssetIdToProgress[625087].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Wireless Network Security Issues & Solutions Score: {{cp.lessonAssetIdToProgress[219349].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219349].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219349].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219349].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - How to Secure a Wireless Network: Best Practices & Measures Score: {{cp.lessonAssetIdToProgress[219335].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219335].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219335].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219335].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Short-Range Wireless Communication: Bluetooth, ZigBee & Infrared Transmission Score: {{cp.lessonAssetIdToProgress[1763].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[1763].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[1763].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[1763].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - Medium-Range Wireless Communication: Wi-Fi & Hotspots Score: {{cp.lessonAssetIdToProgress[1764].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[1764].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[1764].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[1764].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - WLAN Protocols: Types & Characteristics Score: {{cp.lessonAssetIdToProgress[486305].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[486305].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[486305].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[486305].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - Mobile Device Security Threats, Risks & Issues Score: {{cp.lessonAssetIdToProgress[219357].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219357].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219357].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219357].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - What is WEP Network Security? Score: {{cp.lessonAssetIdToProgress[219331].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219331].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219331].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219331].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - What is Wireless Protected Access (WPA)? Score: {{cp.lessonAssetIdToProgress[219327].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219327].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219327].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219327].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - What is Cloud Computing? - Definition, Advantages & Disadvantages Score: {{cp.lessonAssetIdToProgress[5546].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[5546].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[5546].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[5546].bestScoreQuestions}}  Take Quiz Optional
Lesson 10 - Cloud Service Models: IaaS, PaaS & SaaS Score: {{cp.lessonAssetIdToProgress[579841].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[579841].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[579841].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[579841].bestScoreQuestions}}  Take Quiz Optional
Lesson 11 - Cloud Computing Security: Approaches & Requirements Score: {{cp.lessonAssetIdToProgress[579903].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[579903].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[579903].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[579903].bestScoreQuestions}}  Take Quiz Optional
Lesson 12 - Securing Data in the Cloud: Approaches & Importance Score: {{cp.lessonAssetIdToProgress[579905].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[579905].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[579905].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[579905].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(7, 12)}}
Ch 8. Malware, Worms & Viruses {{cp.topicAssetIdToProgress[625089].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - What is Malware? - Definition, Examples & Types Score: {{cp.lessonAssetIdToProgress[219305].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219305].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219305].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219305].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - Malware Analysis: Tools & Techniques Score: {{cp.lessonAssetIdToProgress[219311].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219311].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219311].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219311].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Types of Computer Viruses: Functions & Examples Score: {{cp.lessonAssetIdToProgress[503987].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[503987].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[503987].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[503987].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - What is a Worm Virus? - Definition, Examples & Removal Tools Score: {{cp.lessonAssetIdToProgress[10460].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10460].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[10460].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10460].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - What is Antivirus Software? - Examples & Overview Score: {{cp.lessonAssetIdToProgress[10453].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10453].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[10453].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10453].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - What is a Trojan Horse Virus? - Definition, Examples & Removal Options Score: {{cp.lessonAssetIdToProgress[10451].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10451].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[10451].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10451].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - What is Ransomware? - Definition, Removal & Examples Score: {{cp.lessonAssetIdToProgress[357597].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357597].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357597].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357597].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - What is a Backdoor Virus? - Definition, Removal & Example Score: {{cp.lessonAssetIdToProgress[357591].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357591].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357591].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357591].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - Covert Communication & Channels: Definition, Issues & Tunneling Score: {{cp.lessonAssetIdToProgress[625091].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625091].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625091].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625091].bestScoreQuestions}}  Take Quiz Optional
Lesson 10 - Keystroke Logging: Definition, Types & Implementation Score: {{cp.lessonAssetIdToProgress[625093].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625093].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625093].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625093].bestScoreQuestions}}  Take Quiz Optional
Lesson 11 - What is Spyware? - Definition & Types Score: {{cp.lessonAssetIdToProgress[219295].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219295].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219295].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219295].bestScoreQuestions}}  Take Quiz Optional
Lesson 12 - How to Prevent Computer Spyware Score: {{cp.lessonAssetIdToProgress[219297].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219297].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219297].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219297].bestScoreQuestions}}  Take Quiz Optional
Lesson 13 - What is Adware? - Definition, Protection & Removal Tools Score: {{cp.lessonAssetIdToProgress[10466].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10466].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[10466].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10466].bestScoreQuestions}}  Take Quiz Optional
Lesson 14 - Mobile Malware: Protection & Removal Score: {{cp.lessonAssetIdToProgress[219369].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219369].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219369].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219369].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(8, 12)}}
Ch 9. Network Analysis in Ethical Hacking {{cp.topicAssetIdToProgress[625095].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Networking Services: Explanation & Examples Score: {{cp.lessonAssetIdToProgress[573419].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[573419].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[573419].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[573419].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - Simple Mail Transfer Protocol: Definition & Uses Score: {{cp.lessonAssetIdToProgress[486265].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[486265].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[486265].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[486265].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Sniffers in Cybersecurity: Definition, Types & Tools Score: {{cp.lessonAssetIdToProgress[625097].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625097].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625097].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625097].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - How to use SFTP Score: {{cp.lessonAssetIdToProgress[190507].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[190507].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[190507].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[190507].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - Telnet vs. SSH Score: {{cp.lessonAssetIdToProgress[190489].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[190489].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[190489].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[190489].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - Types of Session Hijacking: Advantages & Disadvantages Score: {{cp.lessonAssetIdToProgress[625099].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625099].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625099].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625099].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - Session Hijacking Tools: Types, Advantages & Disadvantages Score: {{cp.lessonAssetIdToProgress[625101].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625101].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625101].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625101].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - What is a Denial of Service (DoS) Attack? - Definition, Types & Examples Score: {{cp.lessonAssetIdToProgress[10464].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10464].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[10464].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[10464].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - Denial of Service (DoS) Attack Techniques Score: {{cp.lessonAssetIdToProgress[625103].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625103].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625103].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625103].bestScoreQuestions}}  Take Quiz Optional
Lesson 10 - What is a Botnet Attack? - Definition & Examples Score: {{cp.lessonAssetIdToProgress[357609].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357609].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[357609].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[357609].bestScoreQuestions}}  Take Quiz Optional
Lesson 11 - Distributed Denial of Service (DDoS) Attacks: Overview, Tools & Components Score: {{cp.lessonAssetIdToProgress[625105].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625105].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625105].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625105].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(9, 12)}}
Ch 10. Security Incident Response {{cp.topicAssetIdToProgress[625107].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Security Incidents: Explanation, Scope & Guidelines Score: {{cp.lessonAssetIdToProgress[625109].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625109].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[625109].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[625109].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - Information Security Plan: Examples & Incident Response Score: {{cp.lessonAssetIdToProgress[199809].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199809].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[199809].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199809].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - Operating System Security: Policies & Procedures Score: {{cp.lessonAssetIdToProgress[490987].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490987].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[490987].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490987].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - What Is Business Continuity Planning? - Definition & Methodology Score: {{cp.lessonAssetIdToProgress[6925].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[6925].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[6925].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[6925].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - Types of Risk & Creating Contingency Plans Score: {{cp.lessonAssetIdToProgress[79902].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[79902].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[79902].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[79902].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - IT Disaster Planning & Recovery Score: {{cp.lessonAssetIdToProgress[318581].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[318581].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[318581].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[318581].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - Business Impact Analysis: Template & Example Score: {{cp.lessonAssetIdToProgress[142209].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[142209].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[142209].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[142209].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - Approaches to Disaster Recovery for Information Systems Score: {{cp.lessonAssetIdToProgress[490991].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490991].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[490991].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[490991].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - What is the Chain of Custody? - Definition, Procedures & Importance Score: {{cp.lessonAssetIdToProgress[56791].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[56791].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[56791].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[56791].bestScoreQuestions}}  Take Quiz Optional
Lesson 10 - Recording & Preserving Evidence: Methods & Procedures Score: {{cp.lessonAssetIdToProgress[421103].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[421103].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[421103].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[421103].bestScoreQuestions}}  Take Quiz Optional
Lesson 11 - What Are Federal Rules of Evidence? Score: {{cp.lessonAssetIdToProgress[160537].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[160537].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[160537].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[160537].bestScoreQuestions}}  Take Quiz Optional
Lesson 12 - Data Center Security: Standards, Best Practices & Requirements Score: {{cp.lessonAssetIdToProgress[182799].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[182799].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[182799].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[182799].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(10, 12)}}
Ch 11. Network Defensive Technologies {{cp.topicAssetIdToProgress[625111].percentComplete}}% complete
Course Progress Best Score
Lesson 1 - Intrusion Detection Systems (IDS) in Data Security Score: {{cp.lessonAssetIdToProgress[369451].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[369451].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[369451].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[369451].bestScoreQuestions}}  Take Quiz Optional
Lesson 2 - Intrusion Prevention System (IPS): Definition & Types Score: {{cp.lessonAssetIdToProgress[575965].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[575965].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[575965].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[575965].bestScoreQuestions}}  Take Quiz Optional
Lesson 3 - What is a Firewall in Network Security? - Role & Use Score: {{cp.lessonAssetIdToProgress[219321].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219321].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[219321].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[219321].bestScoreQuestions}}  Take Quiz Optional
Lesson 4 - Firewalls in Network Security: Features & Functions Score: {{cp.lessonAssetIdToProgress[575951].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[575951].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[575951].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[575951].bestScoreQuestions}}  Take Quiz Optional
Lesson 5 - SSH Proxy Tunnels Score: {{cp.lessonAssetIdToProgress[190491].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[190491].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[190491].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[190491].bestScoreQuestions}}  Take Quiz Optional
Lesson 6 - What is Unified Threat Management (UTM)? Score: {{cp.lessonAssetIdToProgress[199841].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199841].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[199841].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[199841].bestScoreQuestions}}  Take Quiz Optional
Lesson 7 - Data Loss Prevention (DLP): Methods & Tools Score: {{cp.lessonAssetIdToProgress[601113].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[601113].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[601113].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[601113].bestScoreQuestions}}  Take Quiz Optional
Lesson 8 - Physical Security & Environmental Controls: Methods & Examples Score: {{cp.lessonAssetIdToProgress[601131].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[601131].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[601131].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[601131].bestScoreQuestions}}  Take Quiz Optional
Lesson 9 - Access Control: Types & Implementation Score: {{cp.lessonAssetIdToProgress[603881].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[603881].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[603881].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[603881].bestScoreQuestions}}  Take Quiz Optional
Lesson 10 - Access Control Matrix: Model & Example Score: {{cp.lessonAssetIdToProgress[17371].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[17371].bestScoreQuestions}}  Take Quiz Optional
Score: {{cp.lessonAssetIdToProgress[17371].bestScoreCorrect}}/{{cp.lessonAssetIdToProgress[17371].bestScoreQuestions}}  Take Quiz Optional
Week {{::cp.getGoalWeekForTopic(11, 12)}}
Ch 12. Required Assignments for Computer Science 321 {{cp.topicAssetIdToProgress[625113].percentComplete}}% complete
Learn More
Start Earning College Credit Today

Learn more about the College Accelerator Plan

What to Expect For the Exam

This Study.com course has been evaluated and recommended for college credit. Once you've completed this course, you can take the proctored final exam and potentially earn credit. Follow the steps below to take the exam.

Exam Steps

1
Create Account
2
Register For Exam
3
Take The Exam
4
Get Your Results

Pre-Exam Checklist

Before taking the exam, all of the following requirements must be met:

A College Accelerator Study.com membership.
Completed all lessons in Computer Science 321: Ethical Hacking course and achieved 100% Quiz Progress.
Not attempted to take this exam within the last three days.
Have available proctored exams in this month of membership.
Have not taken this exam three times. (0/3)
Complete the exam readiness quiz.
Please note: Assignments are required to complete this course for credit. You have submitted / required assignments for this course.
Start Exam Registration 

Please meet all of the pre-requirements in the Pre-Exam Checklist in order to take the exam.

Exam Process Details

1. Register For Exam

Registering for the exam is simple. First, be sure you meet the system requirements. Next, you'll need to agree to the academic integrity policy. Then just confirm your name and the exam name, and you're ready to go!

2. Download Software Secure

You'll receive an unique access code. Please write this down — you'll need it to take the exam. Then download Software Secure and follow the installation instructions.

3. Take Exam

The exam contains 50 - 100 multiple choice questions. You will have two hours to complete the exam, so don't start until you're sure you can complete the entire thing. And remember to pace yourself!

4. Get Exam Results

We will send you an email with your official exam results within 1 to 2 weeks. If you would like to raise your grade after receiving your exam results, you can retake quizzes with fewer than 3 attempts. You will then need to retake the final exam.

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Practice Tests in this course
Check your knowledge of this course with a 50-question practice test. Once you take the test, you will receive a detailed exam report complete with your personal statistics and even specific lessons to focus on! Take the practice test now
Your detailed study guide will include:
  • Answers and detailed explanations to each question
  • Video lessons to explain complicated concepts
Course Practice Test
More practice by chapter
See practice tests for:

Request more information

Get in contact with one of our transfer advisors to learn how to earn transferable college credit for Computer Science 321: Ethical Hacking.

Support