CCOG for CIS 285E archive revision 202404
You are viewing an old version of the CCOG. View current version »
- Effective Term:
- Fall 2024
- Course Number:
- CIS 285E
- Course Title:
- Ethical Hacking
- Credit Hours:
- 4
- Lecture Hours:
- 30
- Lecture/Lab Hours:
- 0
- Lab Hours:
- 30
Course Description
Intended Outcomes for the course
Upon successful completion of the course students should be able to:
1. Prepare a vulnerability assessment and penetration test for a network.
2. Execute a penetration test using standard hacking tools in an ethical manner.
3. Report on the strengths and vulnerabilities of the tested network.
4. Identify legal and ethical issues related to vulnerability and penetration testing.
Course Activities and Design
- on-campus lectures or on-line lessons
- Individual reading assignments
- group discussions
- individual and/or group lab assignments
Outcome Assessment Strategies
- Written penetration test plan
- Use of standard hacking tools in an ethical manner
- Results of their penetration test
- Evaluation of the penetration test results
Course Content (Themes, Concepts, Issues and Skills)
Outcome: Plan a vulnerability assessment and penetration test for a network
- Security Testing Methodologies
- Rules of Engagement
Outcome: Execute penetration test using standard hacking tools in an ethical manner including:
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Buffer Overflows
- Cryptography
Outcome: Report on the strengths and vulnerabilities of the tested network
- Technical writing skills
- Presentation skills
- Evaluation skills
Outcome: Identify legal and ethical issues related to vulnerability and penetration testing.
- Research the state of laws that apply to hacking
- Explore ethical systems and how they apply to hacking