|
Jun 01, 2025
|
|
|
|
CSC 460 Ethical Hacking II (3) CSC 410 A continuation of Ethical Hacking I. Special attention is paid toward topics including, but not limited to, session hijacking, evading network security appliances, web server and application hacking, IoT hacking, wireless and mobile hacking, and cloud hacking.
Add to Portfolio (opens a new window)
|
|