CCOG for CIS 285E Fall 2024
- Course Number:
- CIS 285E
- Course Title:
- Ethical Hacking
- Credit Hours:
- 4
- Lecture Hours:
- 30
- Lecture/Lab Hours:
- 0
- Lab Hours:
- 30
Course Description
Introduces the ethical hacking methodologies. Covers applying cyber security concepts to discover and report vulnerabilities in a network. Explores legal and ethical issues associated with ethical hacking. Prerequisites: CIS 179, CIS 140L, and CIS 284C or instructor permission. Audit available.
Intended Outcomes for the course
Upon successful completion of the course students should be able to:
1. Prepare a vulnerability assessment and penetration test for a network.
2. Execute a penetration test using standard hacking tools in an ethical manner.
3. Report on the strengths and vulnerabilities of the tested network.
4. Identify legal and ethical issues related to vulnerability and penetration testing.
Course Activities and Design
- on-campus lectures or on-line lessons
- Individual reading assignments
- group discussions
- individual and/or group lab assignments
Outcome Assessment Strategies
- Written penetration test plan
- Use of standard hacking tools in an ethical manner
- Results of their penetration test
- Evaluation of the penetration test results
Course Content (Themes, Concepts, Issues and Skills)
Outcome: Plan a vulnerability assessment and penetration test for a network
- Security Testing Methodologies
- Rules of Engagement
Outcome: Execute penetration test using standard hacking tools in an ethical manner including:
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Buffer Overflows
- Cryptography
Outcome: Report on the strengths and vulnerabilities of the tested network
- Technical writing skills
- Presentation skills
- Evaluation skills
Outcome: Identify legal and ethical issues related to vulnerability and penetration testing.
- Research the state of laws that apply to hacking
- Explore ethical systems and how they apply to hacking