Program Contact: Frederick Scholl 203-582-7394
Students will be able to plan, organize and perform penetration testing on a simple network. Students will be able to write a formal penetration testing report on those tests. Students will be able to: discuss legal and ethical requirements to conduct penetration tests; scope a pen test project; describe the different types of pen tests including advantages and disadvantages; execute basic commands in Kali Linux; collect open-source intelligence against a target; explain the difference between active and passive scanning; scan a network using Nmap.
This badge is offered as an elective (CYB 615) to students within the MS Cybersecurity degree program.