CMSY-263 Ethical Hacking and Cyber Defense
This course is designed to introduce students to the fundamentals of scanning, testing, hacking, and securing computer systems and networks. Students learn how intruders escalate privileges and what steps can be taken to secure network systems. Students will also learn about Policy Creation, Social Engineering, Distributed Denial of Service (DDoS) and Web Server Attacks, Buffer Overflows, and Virus Creation. This will give students a solid foundation for understanding different security technologies and how they function. The course is delivered using practical real-time demonstration of the latest hacking and penetration testing techniques, methods, tools, tricks, and security measures. This course is designed as an entry-level Information Assurance course, but will significantly benefit system and network administrators, auditors, network security professionals, and anyone who is interested in acquiring the skills of an ethical hacker. It is highly recommended that students have a background in computer and network administration. The course prepares students to take EC-Council Certified Ethical Hacker exam.
Hours Weekly
2 hours lecture, 2 hours lab weekly
Course Objectives
- 1. Demonstrate an understanding of various types of footprinting and network scanning techniques.
- 2. Distinguish computer viruses, worms, and Trojans, and apply countermeasures.
- 3. Demonstrate an understanding of packet sniffing techniques and defend against sniffing.
- 4. Demonstrate an understanding of social engineering techniques and apply countermeasures.
- 5. Demonstrate an understanding of denial of service attacks and apply countermeasures.
- 6. Identify web server and SQL injection attacks, and apply countermeasures.
- 7. Demonstrate the ability to apply system ethical hacking methodology.
- 8. Demonstrate an understanding of wireless attacks and hacking, and apply security.
- 9. Demonstrate the ability to apply firewall, IDS, and honeypot evasion techniques.
- 10. Demonstrate an understanding of buffer overflow attacks and apply countermeasures.
- 11. Demonstrate an understanding of cryptography attacks, and use cryptanalysis tools.
- 12. Demonstrate the ability to apply penetration testing and vulnerability assessment.
- 13. Design a basic network with security and ethical structures properly in place.
Course Objectives
- 1. Demonstrate an understanding of various types of footprinting and network scanning techniques.
- 2. Distinguish computer viruses, worms, and Trojans, and apply countermeasures.
- 3. Demonstrate an understanding of packet sniffing techniques and defend against sniffing.
- 4. Demonstrate an understanding of social engineering techniques and apply countermeasures.
- 5. Demonstrate an understanding of denial of service attacks and apply countermeasures.
- 6. Identify web server and SQL injection attacks, and apply countermeasures.
- 7. Demonstrate the ability to apply system ethical hacking methodology.
- 8. Demonstrate an understanding of wireless attacks and hacking, and apply security.
- 9. Demonstrate the ability to apply firewall, IDS, and honeypot evasion techniques.
- 10. Demonstrate an understanding of buffer overflow attacks and apply countermeasures.
- 11. Demonstrate an understanding of cryptography attacks, and use cryptanalysis tools.
- 12. Demonstrate the ability to apply penetration testing and vulnerability assessment.
- 13. Design a basic network with security and ethical structures properly in place.