Course info
Students will gain knowledge on vulnerability assessment and ethical hacking .Thorough understanding of cybersecurity principles with an emphasis on finding and fixing flaws in intricate IT infrastructures. Students will gain the ability to evaluate and analyze possible security vulnerabilities, carry out penetration testing, and hone their ethical hacking skills through a combination of theoretical underpinnings and practical, hands-on exercises. The program provides students with the information and abilities necessary to succeed in the ever-changing industry of cybersecurity by covering subjects including network security, web-based application security, Social engineering, and incident response.
Rationale:
Course aims vulnerability assessment and ethical hacking in contemporary cybersecurity serves a paramount purpose. The primary goal is to fortify networks, data, and information systems, mitigating potential threats and preventing unauthorized access. Compliance mandates demand a proactive stance, ensuring adherence to regulatory standards. Proactive risk management is facilitated through the identification and mitigation of vulnerabilities before exploitation occurs. The dynamic landscape of cyber threats necessitates ongoing study to adapt strategies and defenses accordingly. By comprehensively understanding and applying these practices, professionals contribute to a robust cybersecurity framework, preserving the integrity of digital assets and fostering a secure environment in the face of evolving cyber challenges.
Objectives:
1. To acquire foundational knowledge of vulnerability assessment tools and ethical hacking techniques, demonstrating understanding in the identification and mitigation of cybersecurity vulnerabilities.
2. To Apply ethical hacking principles, showcasing their ability to make sound ethical decisions in the context of cybersecurity challenges.
3. To analyze cybersecurity regulations and compliance mandates, demonstrating their capacity to interpret and apply legal requirements to ensure organizational alignment with established standards.
4. To synthesize information on evolving cyber threats, developing adaptive cybersecurity strategies that require strategic planning and proactive risk management.- Teacher: Md. Nazmus Sakib