Program Contact: Frederick Scholl 203-582-7394
Students will be able to plan, organize and perform penetration testing on a simple network. Students will be able to write a formal penetration testing report on those tests. Students will be able to: discuss legal and ethical requirements to conduct penetration tests; be able to scope a pen test project; be able to describe the different types of pen tests including advantages and disadvantages; be able to execute basic commands in Kali Linux; be able to collect open-source intelligence against a target; be able to explain the difference between active and passive scanning; be able to scan a network using Nmap.
This badge is offered as an elective (CYB 675) to students within the MS Cybersecurity degree program.