This course provides an in-depth understanding of how to protect IT infrastructure. The course combines ethical hacking methodologies with the hands-on application of security tools to secure computer and other digital systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. In addition, the course covers what an ethical hacker is and how important it is to protect data from cyber attacks. Students will review TCP/IP concepts and practice footprinting, scanning, enumeration, exploitation, and social engineering.