This course will provide students with the essential skills and experience required to identify and document security
vulnerabilities. This is the second course in the sequence. The student will learn penetration testing using ethical
principles to secure a computer data environment. A variety of security technologies and concepts are used to provide
in-depth understanding of secure communications channels, devices and media. Upon successful course completion,
students will be able to identify and mitigate weaknesses in a data infrastructure.