Rouse Company Foundation Student Services Building

CMSY 263 Ethical Hacking and Cyber Defense

This course is designed to introduce students to the fundamentals of ethical hacking and penetration testing. Students learn scanning, testing, hacking and maintaining access to computer systems and networks, as well as appropriate rules of engagement. The techniques used in this class include how intruders escalate privileges, and what steps can be taken to secure network systems. Students will also learn about managing penetration test engagement, social engineering, cloud-based systems, social engineering, Distributed Denial of Service (DDoS) and web server attacks, buffer overflows, attacks on authentication systems and lateral movement. This will give students a solid foundation for understanding different security technologies and how they function. The course is delivered using practical real-time demonstration of the latest hacking and penetration testing techniques, methods, tools, tricks, and security measures. This course is designed as an entry-level Information Assurance course, but will significantly benefit system and network administrators, auditors, network security professionals, and anyone who is interested in acquiring the skills of an ethical hacker. It is highly recommended that students have a background in computer and network administration. The course prepares students to take CompTIA PenTest+ certification exam.

Credits

3

Prerequisite

CMSY 176

Hours Weekly

2 hours lecture, 2 hours lab

Course Objectives

  1. Summarize the actions required for a penetration testing practitioner to manage an assessment engagement.
  2. Apply reconnaissance and enumeration techniques.
  3. Conduct vulnerability discovery using industry-standard techniques and analyze the output.
  4. Demonstrate the use of appropriate attack tools.
  5. Perform tasks in the post-exploitation phase of a penetration test.

Course Objectives

  1. Summarize the actions required for a penetration testing practitioner to manage an assessment engagement.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Final test

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Final test grading
  2. Apply reconnaissance and enumeration techniques.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab Exercises

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab Grade
  3. Conduct vulnerability discovery using industry-standard techniques and analyze the output.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab Exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab Grade
  4. Demonstrate the use of appropriate attack tools.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab Exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab Grade
  5. Perform tasks in the post-exploitation phase of a penetration test.

    This objective is a course Goal Only

    Learning Activity Artifact

    • Other (please fill out box below)
    • Lab Exercise

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Lab Grade