Descriptor Details

  • Introduction to Cybersecurity: Ethical Hacking
  • Not Identified
  • 164
  • Not Identified
  • Not Identified
  • 3.0
  • Not Identified
  • Uploaded: 10/12/2017 04:44:13 PM PDT

This course introduces the network security specialist to the various methodologies for attacking a network. Students will be introduced to the concepts, principles, and techniques, supplemented by hands-on exercises, for attacking and disabling a network within the context of properly securing a network. The course will emphasize network attack methodologies with the emphasis on student use of network attack techniques and tools and appropriate defenses and countermeasures. Students will receive course content information through a variety of methods: lecture and demonstration of hacking tools will be used in addition to a virtual environment. Students will experience a hands-on practical approach to penetration testing measures and ethical hacking.

None

None

ITIS 150 - Computer Network Fundamentals
    AND    ITIS 160 - Introduction to Information Systems Security

  1. Ethical Hacking Overview
  2. Ethics and Legal Aspects for Cybersecurity Professionals
  3. Information Security Frameworks
  4. Transmission Control Protocol/Internet Protocol (TCP/IP) Concepts Review
  5. Network and Computer Attacks
  6. Passive Intelligence Gathering: Footprinting and Social Engineering
  7. Network Reconnaissance
  8. Port Scanning
  9. Enumeration
  10. Fundamentals of Exploitation
  11. Denial of Service
  12. Session Hijacking
  13. Evading Intrusion Detection Systems (IDS), Firewalls, and Honeypots
  14. Vulnerability Analysis
  15. Linux Operating System Vulnerabilities
  16. Internet of Things (IoT) Vulnerabilities and Hacking
  17. Hacking Web Servers
  18. Hacking Wireless Networks
  19. Covering Tracks
  20. Cryptography Fundamentals
  21. Protecting Networks with Security Devices
  22. Cloud Computing
  23. Programming/Scripting for Security Professionals
  24. Embedded Operating Systems


At the conclusion of this course, the student should be able to:

  1. Describe the tools and methodology a "hacker" uses to break into a computer or network.
  2. Defend a computer and a Local Area Network (LAN) against a variety of different types of security attacks using several hands-on techniques.
  3. Describe the legal and ethical aspects of hacking networked systems.

Evaluation will include hands-on projects and a combination of examinations, presentations, discussions, or problem-solving assignments.

  • Simpson, M. T., Backman, K. & Corley, J., Hands-On Ethical Hacking and Network Defense, Cengage
  • Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey, G. & Williams, T., Gray Hat Hacking: The Ethical Hacker’s Handbook, McGraw-Hill Education

  • No
  • Not Identified

  • Not Identified

  • Not Identified

  • Not Identified

  • Not Identified