4 credit/unit hours – Four hours of lecture weekly; one term

This course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks.

Learning Objectives

Upon completion of this course the student will be able to:

  • Understand the various approaches used by attackers;
  • Utilize various information security tools given different target systems in different environments;
  • Discuss how the tools interrelate with each other in an overall penetration testing process;
  • Apply a common ethical hacking methodology to carry out a penetration test;
  • Analyze how penetration testing and ethical hacking fit into a comprehensive enterprise information security program;Implement countermeasures for various types of attacks; and
  • Demonstrate ethical behavior appropriate to security-related technologies

Main Topics

1.0 Hacking: The Next Generation
2.0 TCP/IP Review
3.0 Cryptographic Concepts
4.0 Physical Security
5.0 Footprinting Tools and Techniques
6.0 Port Scanning
7.0 Enumeration and Computer System Hacking
8.0 Wireless Vulnerabilities
9.0 Web and Database Attacks
10.0 Malware
11.0 Sniffers, Session Hijacking, and Denial of Service Attacks
12.0 Linux and Penetration Testing
13.0 Social Engineering
14.0 Incident Response
15.0 Defensive Technologies