|
Dec 26, 2024
|
|
|
|
NET 377 - Ethical Hacking Prac Cybersec Credits: 4 Lecture Hours: 2 Lab Hours: 4 Practicum Hours: 0 Work Experience: 0 Course Type: Voc/Tech This course will introduce the student to hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks. Competencies
- Evaluate Information Security Threats and Attack Vectors
- Discuss Motives, Goals, and Objectives of Information Security Attacks
- Discuss Information Security Threat Categories
- Define Information Warfare
- Outline Ethical Hacking and Scope
- Describe Information Security Controls
- Assess Footprinting Concepts and Methodology
- Demonstrate Website footprinting
- Critique Social Networking construction
- Illustrate Email footprinting
- Dicuss and demonstrate the following: WHOIS, DNS, Networking
- Critique Network Scanning
- Break down Live Systems
- Examine Open Ports
- Compare & Contrast Vulnerabilities
- Perform System Hacking.
- Generate Password cracking techniques
- Demonstrate Privilege Escalation
- Illustration of Covering Tracks
- Evaluate Malware
- Discuss Trojan Concepts
- Demonstrate Viruses and Worms
- Perform Malware Reverse Engineering
- Critique Malware Detection
- Discuss Countermeasures
- Perform Sniffing
- Perform Sniffing Concepts and Tools
- Develop MAC Attacks
- Show DHCP Attacks
- Demonstrate ARP Poisoning
- Show Spoofing Attacks
- Discuss DNS Poisoning
- Examine Social Engineering
- Demonstrate Techniques
- Discuss Impersonation
- Discuss Identity Theft
- Demonstrate Social Engineering Countermeasures
- Simulate Denial of Service/Distributed Denial of Service Attacks
- Discuss Techniques
- Discuss Botnets
- Demonstrate Attack Tools
- Review DOS/DDOS Countermeasures
- Demonstrate Session Hijacking
- Identify the Application Level
- Demonstrate the Network Level
- Demonstrate Tools
- Review Countermeasures
- Perform Webserver and Web Application Hacking
- Dicuss Webserver Attacks
- Demonstrate attack Methodology
- Discuss Tools
- Demonstrate Countermeasures
- Discuss the importance of timely Patch Management
- Evaluate Wireless Network Hacking
- Discuss Concepts
- Compare and Contrast Encryption Methodologies
- Discuss Tools
- Demonstrate wireless hacking Threats
- Generate wireless hacking Methodologies
- Assess IDS, Firewalls, and Honeypots
- Discuss Placement
- Evaluate SNORT as a solution
- Demonstrate IDS Evasion
Add to Portfolio (opens a new window)
|
|