Skip to main content

Penetration Testing

Penetration testing is ethically discovering vulnerabilities in systems in order to best protect those systems.

What is penetration testing?

BYU's Cybersecurity Program offers a complete curriculum encompassing Penetration Testing & Ethical Hacking. Students will learn how to ethically discover vulnerabilities in systems in order to best protect those systems. These courses cover the three basic principles of Cybersecurity: Prepare, Defend and Act. All emphasis courses are available to Computer Science, Information Systems and other engineering students who have completed the necessary pre-requisites.

Key Topics

  • Technical problem solving and trouble shooting
  • Network design and implementation
  • Technical writing and documentation
  • Project management
  • Ethical hacking
  • Network security
  • Social Engineering



  • IT&C 492R - Special Problems in Information Technology & Cybersecurity

    Individual study in current topics of information technology and/or cybersecurity. Learn more here.

  • IT&C 515R - Special Topics in Information Technology & Cybersecurity

    New topics in information technology for graduate and undergraduate students. Standard lecture and lab format. Learn more here.

  • IT&C 529 - Advanced Networking

    Analyzing, selecting, configuring, monitoring, and managing of computer network equipment. SNMP-based monitoring and control in process of fault isolation and root cause analysis. Learn more here.

  • IT&C 544 - System Administration

    Systems and network administration. User management. Server and workstation deployment and maintenance. Network Security. Infrastructure. Systems and infrastructure support. Cross-platform systems integration. Update and patch management. Mobile workforce services. Learn more here.

  • IT&C 548 - Cyber-Physical Systems

    Integration of technologies to develop computers and mobile devices that interact with the real world, including control and sensor interfaces. Incorporate IT core topics such as networks, security, and user-space experience design. Analysis and creation of cyber-physical and Internet-of-Things (IoT) systems. Learn more here.

  • IT&C 567 - Cybersecurity and Penetration Testing

    Advanced computer systems security. Vulnerabilities and exploits. System and network attacks. Ethical hacking and penetration testing. Cybersecurity, cyber weapons, and advanced persistent threats. Legal and regulatory requirements for security and privacy. Learn more here.