C-ID Descriptor
Introduction to Cybersecurity: Ethical Hacking
Descriptor Details
-
Introduction to Cybersecurity: Ethical Hacking
-
Not Identified
-
164
-
Not Identified
-
Not Identified
-
3.0
-
Not Identified
-
Uploaded: 10/12/2017 04:44:13 PM PDT
This course introduces the network security specialist to the various methodologies for attacking a network. Students will be introduced to the concepts, principles, and techniques, supplemented by hands-on exercises, for attacking and disabling a network within the context of properly securing a network. The course will emphasize network attack methodologies with the emphasis on student use of network attack techniques and tools and appropriate defenses and countermeasures. Students will receive course content information through a variety of methods: lecture and demonstration of hacking tools will be used in addition to a virtual environment. Students will experience a hands-on practical approach to penetration testing measures and ethical hacking.
None
None
ITIS 150 - Computer Network Fundamentals
AND ITIS 160 - Introduction to Information Systems Security
- Ethical Hacking Overview
- Ethics and Legal Aspects for Cybersecurity Professionals
- Information Security Frameworks
- Transmission Control Protocol/Internet Protocol (TCP/IP) Concepts Review
- Network and Computer Attacks
- Passive Intelligence Gathering: Footprinting and Social Engineering
- Network Reconnaissance
- Port Scanning
- Enumeration
- Fundamentals of Exploitation
- Denial of Service
- Session Hijacking
- Evading Intrusion Detection Systems (IDS), Firewalls, and Honeypots
- Vulnerability Analysis
- Linux Operating System Vulnerabilities
- Internet of Things (IoT) Vulnerabilities and Hacking
- Hacking Web Servers
- Hacking Wireless Networks
- Covering Tracks
- Cryptography Fundamentals
- Protecting Networks with Security Devices
- Cloud Computing
- Programming/Scripting for Security Professionals
- Embedded Operating Systems
At the conclusion of this course, the student should be able to:
- Describe the tools and methodology a "hacker" uses to break into a computer or network.
- Defend a computer and a Local Area Network (LAN) against a variety of different types of security attacks using several hands-on techniques.
- Describe the legal and ethical aspects of hacking networked systems.
Evaluation will include hands-on projects and a combination of examinations, presentations, discussions, or problem-solving assignments.
- Simpson, M. T., Backman, K. & Corley, J., Hands-On Ethical Hacking and Network Defense, Cengage
- Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey, G. & Williams, T., Gray Hat Hacking: The Ethical Hacker’s Handbook, McGraw-Hill Education
-
No
-
Not Identified
-
Not Identified
-
Not Identified
-
Not Identified
-
Not Identified
Delete Descriptor?
Are you sure you want to delete this descriptor?
Deleted descriptors cannot be restored.