- Course type: Self-paced
- Available Lessons: 109
- Average Lesson Length: 8 min
Eligible for Certificate:
Certificates show that you have completed the course. They do not provide credit.
Watch a preview:chapter 1 / lesson 1What is Ethical Hacking? - Definition, History & Examples
Course SummaryComputer Science 321: Ethical Hacking covers basic and more advanced concepts related to computer security, attacks and vulnerabilities. Use as many or as few of the lessons and chapters as you need to prepare for a test or get caught up after missing class.
To Start This Course Today
Try it risk-free for 30 days
Course Practice TestCheck your knowledge of this course with a 50-question practice test.
- Comprehensive test covering all topics
- Detailed video explanations for wrong answers
About This Course
Developed by experienced instructors, this Computer Science 321: Ethical Hacking course provides easily accessible information related to the foundations of hacking, port scanning, enumeration and security incident response, among other topics. Each lesson is accompanied by a short quiz, and there's also a helpful test included at the end of each chapter to test your knowledge. If you need assistance, our experts are available via the Dashboard to address any questions that you might have. We've made this course self-paced and available 24 hours a day on any mobile device or computer. Whether you are looking to supplement your class learning, re-working your curriculum or refreshing your work knowledge, this course can help.
|Introduction to Ethical Hacking||Reviews software testing, cybercrime, encryption and the uses for cryptography.|
|Foundations of Hacking||Explains privilege escalation, communication protocol, the transport layer of the OSI model and detecting network and port scans.|
|Footprinting & Social Engineering||Details the seven-step information gathering process in ethical hacking, competitive intelligence for SEO and attacks in digital crime.|
|Port Scanning in Ethical Hacking||Discusses network scanners, using traceroutes to determine network range and OS fingerprinting.|
|Enumeration & System Hacking||Outlines security for user access in operating systems, the session layer of the OSI model, types of attacks in network security and different file systems.|
|Web Servers & Database Attacks||Describes database hacking, preventing data breaches, database security management and vulnerabilities in web servers.|
|Wireless Vulnerabilities & Cloud Security||Identifies WLAN protocols, WEP network security, wireless network security issues/solutions and short-range wireless communication.|
|Malware, Worms & Viruses||Explains malware, worm viruses, Trojan horse viruses and covert communications and channels.|
|Network Analysis in Ethical Hacking||Explores simple mail transfer protocol, Telnet, SSH and denial of service (DoS) attack techniques.|
|Security Incident Response||Reviews IT disaster planning and recovery, business impact analysis, the chain of custody and federal rules of evidence.|
|Network Defensive Technologies||Outlines different types of intrusion prevention systems (IPS), SSH proxy tunnels, data loss prevention methods and access control.|
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Research Schools, Degrees & Careers
Get the unbiased info you need to find the right school.
Browse Articles By Category
Browse an area of study or degree level.
- Biological and Biomedical Sciences
- Communications and Journalism
- Computer Sciences
- Culinary Arts and Personal Services
- Liberal Arts and Humanities
- Mechanic and Repair Technologies
- Medical and Health Professions
- Physical Sciences
- Transportation and Distribution
- Visual and Performing Arts
- Master of Computer Science: Computer Systems Security Degree Overview
- Online Computer Science Courses, Classes and Schools
- Online Basic Computer Courses, Classes and Training Programs
- Why Get a Masters in Computer Science?
- Bachelor of Science (BS): Computer Systems Security Degree Overview
- Skip Your Computer Science Class and Learn to Code for Free
- List of Free Online Computer Science Courses and Classes
- Should I Major in Computer Science? - Quiz & Self-Assessment Test
- Computer Science College Rankings
- Top Schools for Computer Science
- Answers and detailed explanations to each question
- Video lessons to explain complicated concepts
Explore our library of over 75,000 lessons
- College Courses
- High School Courses
- Other Courses