Students will scan, test, hack and secure systems. Implement perimeter defenses, scan and attack virtual networks. Other topics include intrusion detection, social engineering, footprinting, DDoS attacks, buffer overflows, SQL injection, privilege escalation, trojans, backdoors, and wireless hacking. Legal restrictions and ethical guidelines emphasized. This course also helps prepare students to pass the Certified Ethical Hacker (C|EH) exam.