Penetration testing and related software tools are presented. Legalities and various cyber-attacks such as distributed denial of service, man-in-the-middle, and password attacks are covered. Methods to correct security flaws are given.
Tampa | College of Engineering | Computer Science and Engineering