When is hacking legal? When you use it to secure your own network. This course will teach you readily available hacking tools and techniques to audit your network so you can locate and close security holes. You will discover how to better protect your system against those who wish to gain unauthorized access.
In this course, you will discover the complex method of electronic breaking and entering. You'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. Following packets of data from one point to another through an entire network, you will discover where the flaws exist for data loss and security breaches. You'll learn about the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. Along the way, you will see how private data can quickly become public knowledge. Let this course establish the foundation of your network security. Learn how hackers think so you can harden your defenses against them!
About The Instructor
Debbie Mahler has worked for 15 years in the computer repair industry and runs her own IT business. She teaches on a wide range of business-related topics at the university level and has written six books on the business. She also contributes to several publications. Mahler holds a Bachelor of Art in Applied Behavioral Psychology and the title of Symantec Software Partner and Security Specialist.