CIS1950 ETHICAL HACKING
3 Credit Hours
Student Level:
This course is open to students on the college level in either the Freshman or Sophomore year.
Catalog Description:
CIS1950- Ethical Hacking (3 hrs.)
This course will prepare students for the EC-Council Certified Ethical Hacker certification. The topics will include the process of preparing for an intrusion, gaining access, performing the attack, covering up the attack, and how to strengthen networks so hackers cannot perform intrusions.
Course Classification:
Lecture
Prerequisites:
None.
Controlling Purpose:
This course is designed to prepare students to understand how hackers will perform intrusions into a computer system. These concepts allow a network professional to understand the complete process and how improper configuration contributes to these attacks. The course focuses on how to strengthen the computer system to prevent these attacks.
Learner Outcomes:
Upon completion of the course, the student will be able to explain the following topics and perform configuration in a lab environment: preparation for an attack, gaining access by reconnaissance, performing the attack, covering up the attack, and how a business needs to protect their infrastructure. The student will solve real world case studies.
Unit Outcomes for Criterion Based Evaluation:
The following outline defines the minimum core content not including the final examination period. Instructors may add other material as time allows.
UNIT 1: Preparation for an Intrusion
Outcomes: Demonstrate knowledge of how to perform reconnaissance, scanning, and enumeration.
-
Discover wireless devices
-
Scan for IoT devices
-
Detect operating systems and applications
-
Identify open ports
-
Scan for vulnerabilities
-
Enumerate network resources
-
Enumerate device information
UNIT 2: Gaining Access
Outcomes: Demonstrate knowledge of obtaining login credentials, gaining administrative access, and escalating privileges
UNIT 3: Performing an Attack
Outcomes: Explain how to perform passive online attacks, active online attacks, and infrastructure attacks
-
Examine hidden web form fields
-
Conduct a man-in-the-middle attack
-
Perform passive sniffing
-
Perform an SQL injection
-
Execute a DoS or DDoS attack
UNIT 4: Covering up the Attack
Outcomes: Describe the process of removing traces of an attack by covering up access
UNIT 5: Title of Unit
Outcomes: Describe how to defend systems and devices as well as implementing defensive system
-
Ensure file integrity
-
Implement drive encryption
-
Use malware protection
-
Implement an Intrusion Detection System (IDS)
-
Create a honeypot
-
Prevent DNS zone transfer
-
Disable unnecessary services
-
Implement physical security countermeasures
-
Configure a perimeter firewall
Projects Required:
Varies, refer to syllabus.
Textbook:
Contact Bookstore for current textbook.
Materials/Equipment Required:
None
Attendance Policy:
Students should adhere to the attendance policy outlined by the instructor in the course syllabus.
Grading Policy:
The grading policy will be outlined by the instructor in the course syllabus.
Maximum class size:
Based on classroom occupancy
Course Time Frame:
The U.S. Department of Education, Higher Learning Commission and the Kansas Board of Regents define credit hour and have specific regulations that the college must follow when developing, teaching and assessing the educational aspects of the college. A credit hour is an amount of work represented in intended learning outcomes and verified by evidence of student achievement that is an institutionally-established equivalency that reasonably approximates not less than one hour of classroom or direct faculty instruction and a minimum of two hours of out-of-class student work for approximately fifteen weeks for one semester hour of credit or an equivalent amount of work over a different amount of time. The number of semester hours of credit allowed for each distance education or blended hybrid courses shall be assigned by the college based on the amount of time needed to achieve the same course outcomes in a purely face-to-face format.
Refer to the following policies:
402.00 Academic Code of Conduct
263.00 Student Appeal of Course Grades
403.00 Student Code of Conduct
Disability Services Program:
Cowley College, in recognition of state and federal laws, will accommodate a student with a documented disability. If a student has a disability which may impact work in this class and which requires accommodations, contact the Disability Services Coordinator.
DISCLAIMER: THIS INFORMATION IS SUBJECT TO CHANGE. FOR THE OFFICIAL COURSE PROCEDURE CONTACT ACADEMIC AFFAIRS.
|