CCOG for CIS 285E archive revision 202404

You are viewing an old version of the CCOG. View current version »

Effective Term:
Fall 2024 through Winter 2025

Course Number:
CIS 285E
Course Title:
Ethical Hacking
Credit Hours:
4
Lecture Hours:
30
Lecture/Lab Hours:
0
Lab Hours:
30

Course Description

Introduces the ethical hacking methodologies. Covers applying cyber security concepts to discover and report vulnerabilities in a network. Explores legal and ethical issues associated with ethical hacking. Audit available.

Intended Outcomes for the course

Upon successful completion of the course students should be able to:

1. Prepare a vulnerability assessment and penetration test for a network.

2. Execute a penetration test using standard hacking tools in an ethical manner.

3. Report on the strengths and vulnerabilities of the tested network.

4. Identify legal and ethical issues related to vulnerability and penetration testing.

Course Activities and Design

  • on-campus lectures or on-line lessons
  • Individual reading assignments
  • group discussions
  • individual and/or group lab assignments

Outcome Assessment Strategies

  • Written penetration test plan
  • Use of standard hacking tools in an ethical manner
  • Results of their penetration test
  • Evaluation of the penetration test results

Course Content (Themes, Concepts, Issues and Skills)

Outcome: Plan a vulnerability assessment and penetration test for a network

  • Security Testing Methodologies
  • Rules of Engagement

Outcome: Execute penetration test using standard hacking tools in an ethical manner including:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography

Outcome: Report on the strengths and vulnerabilities of the tested network

  • Technical writing skills
  • Presentation skills
  • Evaluation skills

Outcome: Identify legal and ethical issues related to vulnerability and penetration testing.

  • Research the state of laws that apply to hacking
  • Explore ethical systems and how they apply to hacking