|
Jan 02, 2025
|
|
|
|
CIS 471 - Computer Insecurity 3 Credit(s)
Corporate database leaks, criminal ransomware, and even covert warfare are so common they no longer make headlines. This course takes the general question, “How do hackers DO that?” seriously, exploring unsecure computing from the point of view of attackers looking to exploit flaws. Starting with ethical hacking, this technical look at offensive reverse engineering helps computer scientists feel computer insecurity as they mount the guard at the borders of their domains.
Prerequisite(s): CIS 371
Add to Portfolio (opens a new window)
|
|