Courses Courses Arts and Design Arts and Design Animation Graphic Arts Photography Web Design Business Business Accounting Administrative Communication Finance Marketing and Sales Operations Project Management Small Business Soft Skills Career Online High School Career Online High School Online High School Diploma Computer Applications Computer Applications Autodesk Microsoft QuickBooks Windows Computer Science Computer Science Programming Construction and Trades Construction and Trades Construction Environmental and Energy Trades Health and Fitness Health and Fitness Alternative Medicine Dental Fitness Medical Veterinary Wellness Hospitality Hospitality Hospitality Service Information Technology Information Technology Cloud Computing Networking Other Security Language Language Languages Legal Legal Legal Studies Math and Science Math and Science Mathematics and Science Teacher Professional Development Teacher Professional Development Child Development Classroom Technology Math and Science Reading and Writing Test Prep Test Prep Exam Prep Writing Writing Writing and Editing Skill Map Resources Resources About ed2go Externship Programs Financial Assistance Find a School Blog MyCAA

CONTACT US

(855) 520-6806

See all results for ""

See All Courses

ed2go Information Technology Security Advanced PC Security
Return to Security
internet-security

Advanced PC Security

When is hacking legal? When you use it to secure your own network. This course will teach you readily available hacking tools and techniques to audit your network so you can locate and close security holes. You will discover how to better protect your system against those who wish to gain unauthorized access.

In this course, you will discover the complex method of electronic breaking and entering. You'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. Following packets of data from one point to another through an entire network, you will discover where the flaws exist for data loss and security breaches. You'll learn about the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. Along the way, you will see how private data can quickly become public knowledge. Let this course establish the foundation of your network security. Learn how hackers think so you can harden your defenses against them!

6 Weeks / 24 Course Hrs
Starting June 17, 2020

Offered in Partnership with your Preferred School

ed2go

Why this school? It's been chosen based on your location or if you've visited this school's website. Change School

Learning Method

Instructor-led

Confirm your Start Date in Cart

Starting June 17 | July 15
Self-Paced

No instructor. Study on your own schedule

Advanced PC Security

Details + Objectives

Course Code: hck

What You Will Learn
  • Learn the fundamentals of hacking in order to audit the security of your home computer or business network
  • Discover how information packets move through a network and locate weak points in your own system
  • Examine the terms and programming behind the interaction of hardware and software
  • Learn to manage the risk involved with running certain programs by understanding what they do and how they operate
How the course is taught
  • Instructor-led or self-paced online course
  • 6-12 weeks to complete
  • 24 course hours
How you will benefit
  • Learn the skills and knowledge you will need to protect your own privacy and information
  • Gain confidence and peace of mind through performing your own security audits
  • Learn ethical hacking skills that are increasingly-valuable and sought after by today's businesses

Outline

Expand All
Introduction to Hacking

If you've ever wondered about the different types of hackers, what motivates them, and when hacking is considered ethical, this lesson answers these questions and more! You'll learn about the white-, black-, and gray-hat hackers, why they hack, the methods they use, and the ethics of computing and hacking. You'll also get your feet wet by learning how to conduct a security audit on your network by trying to penetrate it just as a hacker would!

Social Engineering

This is the lesson where you'll learn about people hacking! Social engineering is the official term for the physical and psychological methods hackers use to gain entry to your system. Intrigued? Good. Get ready to learn the insider techniques of how hackers gain information about your networks through preying on the weakest link in any organization—its employees!

Google Hacking 101

If you've ever used the Google search engine to find information on the Internet, you know how powerful it is. Hackers know this too, and they have found a way to use the built-in power of Google to gather information about your network! By learning how the search engine works, you'll see why and how Google stores so much public and private information. Then, you'll learn how hackers extract this wealth of information and how they use it against you.

Google Hacking 102

In this lesson, you'll learn advanced Google hacking techniques so that you can perform a Google hack for your security audit. Get a full list of advanced hacking operators and discover—in depth—the advanced method of querying Google. Through a step-by-step example, you'll see how a search query is performed and what results look like. And of course, you'll learn how to incorporate this hacking method into your own security audit!

The Network Model

Have you ever wondered what really goes on within your network? The OSI 7 Layer Network Model is the standard on which networks are built, so in order to fully understand how networks are hacked, you need to understand this model. But have no fear! You'll learn the purpose, function, and communication methods of each layer within the model

The Internet and Packet Spoofing

Have you ever wanted to see what kind of information your network is sending out into cyberspace? Well, it's all in the packets. Once you understand the OSI 7 Layer Network Model, you can now understand packets that travel across a network. It's in those packets that hackers can gain the most information about your network. You'll learn how communication between two networks takes place—from the initial handshake to the termination of the connection—and how you can capture packets from your network just as a hacker would.

Vulnerabilities

Now that you've learned how a hacker scouts out your network and gains information, it would be nice to know from what direction they'll attack you from, won't it? Learn how to look for signs that your network has been exposed or penetrated. By understanding the levels of security, from vulnerability through exposure, you'll view a hack through the eyes of a real hacker.

Port Scanning and Discovery

You probably know that common ports connect printers, USB devices, and the like. But, did you know that there are also ports hidden inside your computer? And more importantly, do you know how these hidden ports can endanger you if they are left exposed on your network? In this lesson, you'll look at a PC from the inside out. This lavishly illustrated lesson will help you understand what ports are, where they are located, and what they do. Then, it's a short step to understanding how leaving these ports open can result in a hacker learning the services and software running on your network.

Services

While the term necessary evil is a cliché, there are a few necessary evils in the computing world. In order to make networks function, sometimes you'll need to run programs that might not be good for your network's security. You'll need to learn to manage the risk involved with running these services by understanding what they do, how they operate, and what you can do to keep them from exposing your network core.

More Evil Network Services

Get ready to learn about rootkits in this information-packed lesson! A hacker's best friend, these malicious programs run undetected in the background of your system, launching malicious attacks, sometimes even without your knowledge. It's difficult to detect and remove rootkits, but for the sake of your PC's security, you'll need to know how to do both.

Audit Plan and Risk

Have you ever analyzed your risk? In this lesson, you'll learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Hand in hand with the analysis is your audit plan, where you can probe your computer or network for the weakest links. And then, you'll learn about what to do once you've found them.

Computer Forensics

If you like forensics television shows like CSI, this lesson is for you. No PC security course could be complete without an introduction to computer forensics, which is a precise science used to contain security breaches and minimize loss in the event of an attack. Learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.

View All Sections

Instructors & Support

Debbie Mahler

Debbie Mahler has worked for 15 years in the computer repair industry and runs her own IT business. She teaches on a wide range of business-related topics at the university level and has written six books on the business. She also contributes to several publications. Mahler holds a Bachelor of Art in Applied Behavioral Psychology and the title of Symantec Software Partner and Security Specialist.

Requirements

Requirements

Requirements:

Hardware Requirements:

  • This course can be taken on either a PC or Mac.
  • In addition your primary computer, you will need access to one or more networked computers that do not contain any data you consider sensitive, due to performing security exercises and testing throughout the course.

Software Requirements:

  • PC: Windows 8 or later.
  • Mac: OS X Snow Leopard 10.6 or later.
  • Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
  • Adobe Acrobat Reader. Click here to download the Acrobat Reader.
  • Software must be installed and fully operational before the course begins.

Other:

  • Email capabilities and access to a personal email account.

Prerequisites:

  • Completion of the online Introduction to PC Security course (or equivalent experience), or completion of Introduction to Networking course (or equivalent experience).
  • You must be familiar with PC and networking terminology and have at least a basic knowledge of how networks function.
Fundamentals

Introduction to PC Security

with Debbie Mahler

Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. In this course, a security expert will teach you the fundamentals of PC and network security as you learn to install and configure a firewall to build an impenetrable moat around your computer or network.

Course Code: PCS

  • Course Hrs
Fundamentals

Introduction to Networking

with David Iseminger

Learn to perform basic computer networking tasks such as DSL connectivity, configuring connections to an ISP and creating a private network. This course explains computer networking basics in easy-to-understand terms, using concepts common to everyday, non-computing experience.

Course Code: ITN

  • Course Hrs
Instructional Materials

The instructional materials required for this course are included in enrollment and will be available online.

FAQs

Expand All
When can I get started?

Instructor-Led: A new session of each course begins each month. Please refer to the session start dates for scheduling.

Self-Paced: You can start this course at any time your schedule permits.

How does it work?

Instructor-Led: Once a session starts, two lessons will be released each week, for the 6 week duration of your course. You will have access to all previously released lessons until the course ends.

Self-Paced: You have three-month access to the course. After enrolling, you can learn and complete the course at your own pace, within the allotted access period.

How long do I have to complete each lesson?

Instructor-Led: The interactive discussion area for each lesson automatically closes 2 weeks after each lesson is released, so you're encouraged to complete each lesson within two weeks of its release.

Self-Paced: There is no time limit to complete each lesson, other than completing all lessons before your three-month access.

What if I need an extension?

Instructor-Led: The Final Exam will be released on the same day as the last lesson. Once the Final Exam has been released, you will have 2 weeks plus 10 days to complete the Final and finish any remaining lessons in your course. No further extensions can be provided beyond these 10 days.

Self-Paced: Because this course is self-paced, no extensions will be granted after the start of your enrollment.

Browse All

Reviews