• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Readings

August 29, 2020 by Anthony Messina Leave a Comment

The readings this week introduced us to the fundamentals of how a network operates.  They presented us with a basic understanding of the hardware involved in networking and how the information is transmitted and received.  The articles also explained how two popular networking models, OSI and TCP/IP, function.  From an ethical hacking standpoint, understanding these 2 models, and how information traverses the network is paramount.  A big takeaway from the readings was understanding how ports work in networking.  As ethical hackers we will be scanning for open ports and it will be essential to know what services run on which ports so they may be further exploited.

 

My question to the class:

What ports/services do you think will be common exploitation entry points as ethical hackers?

Filed Under: Uncategorized Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in