Mar 29, 2024  
2022 - 2023 Cowley College Academic Catalog 
    
2022 - 2023 Cowley College Academic Catalog [ARCHIVED CATALOG]

CIS1950 ETHICAL HACKING COURSE PROCEDURE


CIS1950 ETHICAL HACKING

3 Credit Hours

Student Level:

This course is open to students on the college level in either the Freshman or Sophomore year.

Catalog Description:

CIS1950- Ethical Hacking (3 hrs.) 

This course will prepare students for the EC-Council Certified Ethical Hacker certification. The topics will include the process of preparing for an intrusion, gaining access, performing the attack, covering up the attack, and how to strengthen networks so hackers cannot perform intrusions.

Course Classification:

Lecture

Prerequisites:

None.   

Controlling Purpose: 

This course is designed to prepare students to understand how hackers will perform intrusions into a computer system. These concepts allow a network professional to understand the complete process and how improper configuration contributes to these attacks. The course focuses on how to strengthen the computer system to prevent these attacks.

Learner Outcomes:

Upon completion of the course, the student will be able to explain the following topics and perform configuration in a lab environment: preparation for an attack, gaining access by reconnaissance, performing the attack, covering up the attack, and how a business needs to protect their infrastructure. The student will solve real world case studies.

Unit Outcomes for Criterion Based Evaluation: 

The following outline defines the minimum core content not including the final examination period.  Instructors may add other material as time allows.

UNIT 1: Preparation for an Intrusion

Outcomes: Demonstrate knowledge of how to perform reconnaissance, scanning, and enumeration.  

  • Perform reconnaissance with operating system tools 

  • Perform reconnaissance with hacking tools 

  • Scan for network devices 

  • Discover wireless devices 

  • Scan for IoT devices 

  • Detect operating systems and applications 

  • Identify open ports 

  • Scan for vulnerabilities 

  • Enumerate network resources 

  • Enumerate device information  

UNIT 2:  Gaining Access

Outcomes: Demonstrate knowledge of obtaining login credentials, gaining administrative access, and escalating privileges

  • Obtain credentials using tools 

  • Use Social Engineering  

  • Gain access through backdoor 

  • Escalate privileges 

  • Hijack a web session  

  • Crack Wi-Fi devices

UNIT 3: Performing an Attack 

Outcomes: Explain how to perform passive online attacks, active online attacks, and infrastructure attacks

  • Examine hidden web form fields 

  • Conduct a man-in-the-middle attack 

  • Perform passive sniffing 

  • Perform an SQL injection 

  • Execute a DoS or DDoS attack 

  • Perform active sniffing 

  • Attack a web server 

  • Access wireless networks 

  • Evade firewalls, IDSs, and honeypots  

UNIT 4: Covering up the Attack 

Outcomes: Describe the process of removing traces of an attack by covering up access

  • Disable auditing 

  • Clear logs  

  • Remove or hide files and folders 

  • Change MAC address

UNIT 5: Title of Unit 

Outcomes: Describe how to defend systems and devices as well as implementing defensive system

  • Hide a web server banner broadcast 

  • Discover rogue hosts 

  • Secure mobile devices 

  • Configure account policies and account control 

  • Ensure file integrity 

  • Implement drive encryption 

  • Use malware protection 

  • Implement an Intrusion Detection System (IDS) 

  • Create a honeypot  

  • Prevent DNS zone transfer 

  • Disable unnecessary services 

  • Implement physical security countermeasures 

  • Configure a perimeter firewall

Projects Required: 

Varies, refer to syllabus.

Textbook: 

Contact Bookstore for current textbook.

Materials/Equipment Required: 

None

Attendance Policy: 

Students should adhere to the attendance policy outlined by the instructor in the course syllabus.

Grading Policy: 

The grading policy will be outlined by the instructor in the course syllabus.

Maximum class size: 

Based on classroom occupancy

Course Time Frame: 

The U.S. Department of Education, Higher Learning Commission and the Kansas Board of Regents define credit hour and have specific regulations that the college must follow when developing, teaching and assessing the educational aspects of the college.  A credit hour is an amount of work represented in intended learning outcomes and verified by evidence of student achievement that is an institutionally-established equivalency that reasonably approximates not less than one hour of classroom or direct faculty instruction and a minimum of two hours of out-of-class student work for approximately fifteen weeks for one semester hour of credit or an equivalent amount of work over a different amount of time.  The number of semester hours of credit allowed for each distance education or blended hybrid courses shall be assigned by the college based on the amount of time needed to achieve the same course outcomes in a purely face-to-face format.

Refer to the following policies:

402.00 Academic Code of Conduct 

263.00 Student Appeal of Course Grades 

403.00 Student Code of Conduct

Disability Services Program: 

Cowley College, in recognition of state and federal laws, will accommodate a student with a documented disability.  If a student has a disability which may impact work in this class and which requires accommodations, contact the Disability Services Coordinator.

DISCLAIMER: THIS INFORMATION IS SUBJECT TO CHANGE. FOR THE OFFICIAL COURSE PROCEDURE CONTACT ACADEMIC AFFAIRS.