CCOG for CIS 285E archive revision 201902
You are viewing an old version of the CCOG. View current version »
- Effective Term:
- Spring 2019 through Summer 2024
- Course Number:
- CIS 285E
- Course Title:
- Ethical Hacking
- Credit Hours:
- 4
- Lecture Hours:
- 30
- Lecture/Lab Hours:
- 0
- Lab Hours:
- 30
Course Description
Introduces the ethical hacking methodologies. Covers applying cyber security concepts to discover and report vulnerabilities in a network. Explores legal and ethical issues associated with ethical hacking. Audit available.
Intended Outcomes for the course
Upon completion of the course students should be able to:
- Plan a vulnerability assessment and penetration test for a network.
- Execute a penetration test using standard hacking tools in an ethical manner.
- Report on the strengths and vulnerabilities of the tested network.
- Identify legal and ethical issues related to vulnerability and penetration testing.
Course Activities and Design
- on-campus lectures or on-line lessons
- Individual reading assignments
- group discussions
- individual and/or group lab assignments
Outcome Assessment Strategies
- Written penetration test plan
- Use of standard hacking tools in an ethical manner
- Results of their penetration test
- Evaluation of the penetration test results
Course Content (Themes, Concepts, Issues and Skills)
Outcome: Plan a vulnerability assessment and penetration test for a network
- Security Testing Methodologies
- Rules of Engagement
Outcome: Execute penetration test using standard hacking tools in an ethical manner including:
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Buffer Overflows
- Cryptography
Outcome: Report on the strengths and vulnerabilities of the tested network
- Technical writing skills
- Presentation skills
- Evaluation skills
Outcome: Identify legal and ethical issues related to vulnerability and penetration testing.
- Research the state of laws that apply to hacking
- Explore ethical systems and how they apply to hacking