The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
    University of North Carolina at Charlotte
   
 
  Sep 24, 2017
 
 
    
Graduate Catalog | 2016-2017 Previous Edition

[Add to Favorites]

ITIS 5220 - Vulnerability Assessment and System Assurance


Credit Hours: (3)

Discusses methodologies, tools, and technologies that are important for vulnerability assessment and systems assurance. Topics covered include: ethical hacking techniques, vulnerability assessment, risk assessment/management, finding new exploits, discovering vulnerabilities, penetrating network perimeters, bypassing auditing systems, and assured administration of systems as well as evaluating systems assurance levels. Focus will be placed on 1) understanding current penetration techniques for networks, operating systems, services and applications; 2) investigating mitigation and defense strategies; and 3) studying legal and ethical considerations. The course is based on case studies with a strong lab component.

Restriction(s): CCI graduate standing or permission of department.
Cross-listed as: HCIP 5220 .



Most Recently Offered (Day): Course has not been offered at this time in the past 3 years
Most Recently Offered (Evening): Course has not been offered at this time in the past 3 years


Click here for the Fall 2017 Schedule of Classes




[Add to Favorites]