Request for consultation
Your form is submitting...
Overview
MindTap for Wilson's Hands-On Ethical Hacking and Network Defense is the online learning platform that powers students from memorization to mastery. It gives you complete control of your course -- to provide engaging content, to challenge every individual and to build their confidence. Empower students to accelerate their progress with MindTap. MindTap: Powered by You.
MindTap gives you complete ownership of your content and learning experience. Customize the interactive syllabi, emphasize the most important topics and add your own material or notes in the ebook.
All MindTap activities and assignments are tied to the learning objectives. The live virtual machine labs allow students to practice, explore and try different solutions in a safe, sandbox environment using real Cisco hardware and virtualized Windows, Linux and UNIX operating systems.
Readings and projects give balanced coverage to prepare students to become future network security professionals. Security for Life assignments inspire students to stay current with new and emerging technologies. Pre- and post-exams offer scenario-based questions and allow you to measure how much students have learned using analytics and reporting that make it easy to see where the class stands in terms of progress, engagement and completion rates. Auto-graded module quizzes also help you gauge students' mastery of the course topics.
Use the content and learning path as-is, or pick and choose how the material will wrap around your own content. You control what the students see and when they see it.
- MindTap helps streamline your workflow with carefully curated content tied to learning objectives and a unique set of tools, saving you valuable time in your course preparations. In addition, it automatically grades assignments and quizzes while also providing students with instant feedback on their work.
- MINDTAP IS AN OUTCOME-DRIVEN APPLICATION THAT PROPELS STUDENTS FROM MEMORIZATION TO MASTERY. It's the only platform that gives you complete ownership of your course. With it, you can challenge every student, build their confidence and empower them to be unstoppable.
- ACCESS EVERYTHING YOU NEED IN ONE PLACE. Cut down on prep with preloaded, organized course materials in MindTap. Teach more efficiently with interactive multimedia, assignments, quizzes and more. And give your students the power to read, listen and study on their phones, so they can learn on their terms.
- Pre- and Post-Assessments allow you to measure how much students have learned using analytics and reporting that makes it easy to see where the class stands in terms of progress, engagement and completion rates.
- Security for Life assignments encourage students to stay current with the latest trends and technologies in cybersecurity.
- EMPOWER YOUR STUDENTS TO REACH THEIR POTENTIAL. Twelve distinct metrics give you actionable insights into student engagement. Identify topics troubling your entire class and instantly communicate with struggling students. And students can track their scores to stay motivated toward their goals. Together, you can accelerate progress.
- YOUR COURSE. YOUR CONTENT. Only MindTap gives you complete control over your course. You have the flexibility to reorder textbook modules, add your own notes and embed a variety of content including OER. Personalize course content to your students' needs. They can even read your notes, add their own and highlight key text to aid their progress.
- A DEDICATED TEAM, WHENEVER YOU NEED THEM. MindTap isn't just a tool; it's backed by a personalized team eager to support you. Get help setting up your course and tailoring it to your specific objectives. You'll be ready to make an impact from day one. And, we'll be right here to help you and your students throughout the semester -- and beyond.
Module 2. TCP/IP Concepts Review.
Module 3. Network and Computer Attacks.
Module 4. Footprinting and Social Engineering.
Module 5. Port Scanning.
Module 7. Programming for Security Professionals.
Module 8. Desktop and Server OS Vulnerabilities.
Module 9. Embedded Operating Systems: The Hidden Threat.
Module 10. Hacking Web Applications.
Module 11. Hacking Wireless Networks.
Module 12. Cryptography.
Module 13. Network Protection Systems.
Module 14. The Final Project.
Appendix A. Legal Resources.
Appendix B. Resources.