May 26, 2022  
2020-2021 Course Catalog 
    
2020-2021 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

NET 377 - Ethical Hacking Prac Cybersec

Credits: 4
Lecture Hours: 2
Lab Hours: 4
Practicum Hours: 0
Work Experience: 0
Course Type: Voc/Tech
This course will introduce the student to hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.
Competencies
 

  1. Evaluate Information Security Threats and Attack Vectors
    1. Discuss Motives, Goals, and Objectives of Information Security Attacks
    2. Discuss Information Security Threat Categories
    3. Define Information Warfare
    4. Outline Ethical Hacking and Scope
    5. Describe Information Security Controls
  2. Assess Footprinting Concepts and Methodology
    1. Demonstrate Website footprinting
    2. Critique Social Networking construction
    3. Illustrate Email footprinting
    4. Dicuss and demonstrate the following: WHOIS, DNS, Networking
  3. Critique Network Scanning
    1. Break down Live Systems
    2. Examine Open Ports
    3. Compare & Contrast Vulnerabilities
  4. Perform System Hacking.
    1. Generate Password cracking techniques
    2. Demonstrate Privilege Escalation
    3. Illustration of Covering Tracks
  5. Evaluate Malware
    1. Discuss Trojan Concepts
    2. Demonstrate Viruses and Worms
    3. Perform Malware Reverse Engineering
    4. Critique Malware Detection
    5. Discuss Countermeasures
  6. Perform Sniffing
    1. Perform Sniffing Concepts and Tools
    2. Develop MAC Attacks
    3. Show DHCP Attacks
    4. Demonstrate ARP Poisoning
    5. Show Spoofing Attacks
    6. Discuss DNS Poisoning
  7. Examine Social Engineering
    1. Demonstrate Techniques
    2. Discuss Impersonation
    3. Discuss Identity Theft
    4. Demonstrate Social Engineering Countermeasures
  8. Simulate Denial of Service/Distributed Denial of Service Attacks
    1. Discuss Techniques
    2. Discuss Botnets
    3. Demonstrate Attack Tools
    4. Review DOS/DDOS Countermeasures
  9. Demonstrate Session Hijacking
    1. Identify the Application Level
    2. Demonstrate the Network Level
    3. Demonstrate Tools
    4. Review Countermeasures
  10. Perform Webserver and Web Application Hacking
    1. Dicuss Webserver Attacks
    2. Demonstrate attack Methodology
    3. Discuss Tools
    4. Demonstrate Countermeasures
    5. Discuss the importance of timely Patch Management
  11. Evaluate Wireless Network Hacking
    1. Discuss Concepts
    2. Compare and Contrast Encryption Methodologies
    3. Discuss Tools
    4. Demonstrate wireless hacking Threats
    5. Generate wireless hacking Methodologies
  12. Assess IDS, Firewalls, and Honeypots
    1. Discuss Placement
    2. Evaluate SNORT as a solution
    3. Demonstrate IDS Evasion



Add to Portfolio (opens a new window)