This course Prepares students to assess and then correct the vulnerabilities present within information systems. Students learn about tools and penetration testing methodologies used by ethical hackers and discusses what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types." Systems are also investigated.