Skip to main content

Network Exploits and Vulnerabilities FSCT 8590

Forensic Investigation Course

International Fees

International fees are typically three times the amount of domestic fees. Exact cost will be calculated upon completion of registration.

Course details

The course covers a wide range of topics from common vulnerabilities and tools that are used to exploit, to incident response and handling. Addresses theoretical and practical issues in malicious programs and scripts, stegonagraphy, worms and different types of network exploits and attacks.

Prerequisite(s)

Credits

3.0

Not offered this term
This course is not offered this term. Please check back next term or subscribe to receive notifications of future course offerings and other opportunities to learn more about this course and related programs.

Learning Outcomes

Upon successful completion of this course, the student will be able to:

  • Plan and use exploit code and hacker tools for the purposes of gaining an understanding of network vulnerabilities.
  • Plan and use monitoring and scanning tools to identify system vulnerabilities.
  • Plan and use security tools to protect information and systems.
  • Plan and use freely available tools and off-the-shelf hardware to sniff wireless traffic and compromise 802.11 networks.
  • Plan and use popular frameworks such as Metasploit to penetrate and test systems vulnerabilities.
  • Plan and use popular frameworks such as Metasploit to penetrate and test systems vulnerabilities.

Effective as of Winter 2018

Related Programs

Network Exploits and Vulnerabilities (FSCT 8590) is offered as a part of the following programs:

School of Computing and Academic Studies

  1. Forensic Investigation (Digital Forensics and Cybersecurity Option)
    Advanced Certificate Part-time
  2. Forensic Investigation (Digital Forensics and Cybersecurity Option)
    Bachelor of Technology Full-time/Part-time

Contact Us

If you have a question or comment about this course, please complete and submit the form below.

  • Privacy Notice: The information you provide will be used to respond to your request for BCIT program information and is collected under Section 26(c) of the Freedom of Information and Protection of Privacy Act (FIPPA). For more information about BCIT’s privacy practices contact: Associate Director, Privacy, Information Access & Policy Management, British Columbia Institute of Technology, 3700 Willingdon Ave. Burnaby, BC V5G 3H2, email: privacy@bcit.ca.
  • This field is for validation purposes and should be left unchanged.

Subscribe

Interested in being notified about future offerings of Network Exploits and Vulnerabilities (FSCT 8590)? If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.

  • Privacy Notice: The information you provide will be used to respond your request for BCIT course information and is collected under Section 26(c) of the Freedom of Information and Protection of Privacy Act (FIPPA). For more information about BCIT’s privacy practices contact: Associate Director, Privacy, Information Access & Policy Management, British Columbia Institute of Technology, 3700 Willingdon Ave. Burnaby, BC V5A 3H2, email: privacy@bcit.ca.