The best way to defeat a hacker is to code like one. That means being able to build, extend, and manipulate scripts and applications that compromise systems. This course presents a number of techniques for exploiting vulnerabilities in a variety of computer systems. Students will build port scanners, construct botnets, write exploits, create their own forensic analysis and network traffic analysis tools, develop web reconnaissance applications, implement scripts for examining and exploiting a wireless network, and craft malware that evade antivirus tools.
- Programming in Bash, Python, Windows PowerShell, and PHP.
- How to use network analysis tools including Nmap and Netcat.
- How to write programs that exploit vulnerabilities in Linux and Windows operating systems.
- How to write programs that exploit website vulnerabilities.
Take the Next Step
Learn more about Lewis University's online programs. Call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.