Course Content and Outcomes Guides (CCOG)

Course Content and Outcomes Guide for CIS 285E Effective Summer 2020

Course Number:
CIS 285E
Course Title:
Ethical Hacking
Credit Hours:
4
Lecture Hours:
30
Lecture/Lab Hours:
0
Lab Hours:
30
Special Fee:
$12

Course Description

Introduces the ethical hacking methodologies. Covers applying cyber security concepts to discover and report vulnerabilities in a network. Explores legal and ethical issues associated with ethical hacking. Prerequisites: CIS 179, CS 140U, and CIS 284C or instructor permission. Audit available.

Intended Outcomes for the course

Upon completion of the course students should be able to:

  • Plan a vulnerability assessment and penetration test for a network.
  • Execute a penetration test using standard hacking tools in an ethical manner.
  • Report on the strengths and vulnerabilities of the tested network.
  • Identify legal and ethical issues related to vulnerability and penetration testing.

Course Activities and Design

  • on-campus lectures or on-line lessons
  • Individual reading assignments
  • group discussions
  • individual and/or group lab assignments

Outcome Assessment Strategies

  • Written penetration test plan
  • Use of standard hacking tools in an ethical manner
  • Results of their penetration test
  • Evaluation of the penetration test results

Course Content (Themes, Concepts, Issues and Skills)

Outcome: Plan a vulnerability assessment and penetration test for a network

  • Security Testing Methodologies
  • Rules of Engagement

Outcome: Execute penetration test using standard hacking tools in an ethical manner, including:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography

Outcome: Report on the strengths and vulnerabilities of the tested network

  • Technical writing skills
  • Presentation skills
  • Evaluation skills

Outcome: Identify legal and ethical issues related to vulnerability and penetration testing.

  • Research the state of laws that apply to hacking
  • Explore ethical systems and how they apply to hacking