Rouse Company Foundation Student Services Building

CMSY 263 Ethical Hacking and Cyber Defense

This course is designed to introduce students to the fundamentals of scanning, testing, hacking, and securing computer systems and networks. Students learn how intruders escalate privileges and what steps can be taken to secure network systems. Students will also learn about Policy Creation, Social Engineering, Distributed Denial of Service (DDoS) and Web Server Attacks, Buffer Overflows, and Virus Creation. This will give students a solid foundation for understanding different security technologies and how they function. The course is delivered using practical real-time demonstration of the latest hacking and penetration testing techniques, methods, tools, tricks, and security measures. This course is designed as an entry-level Information Assurance course, but will significantly benefit system and network administrators, auditors, network security professionals, and anyone who is interested in acquiring the skills of an ethical hacker. It is highly recommended that students have a background in computer and network administration. The course prepares students to take EC-Council Certified Ethical Hacker exam.

Credits

3

Prerequisite

CMSY 176

Hours Weekly

2 hours lecture, 2 hours lab

Course Objectives

  1. Demonstrate an understanding of various types of footprinting and network scanning techniques.
  2. Distinguish computer viruses, worms, and Trojans, and apply countermeasures.
  3. Demonstrate an understanding of packet sniffing techniques and defend against sniffing.
  4. Demonstrate an understanding of social engineering techniques and apply countermeasures.
  5. Demonstrate an understanding of denial of service attacks and apply countermeasures.
  6. Identify web server and SQL injection attacks, and apply countermeasures.
  7. Demonstrate the ability to apply system ethical hacking methodology.
  8. Demonstrate an understanding of wireless attacks and hacking, and apply security.
  9. Demonstrate the ability to apply firewall, IDS, and honeypot evasion techniques.
  10. Demonstrate an understanding of buffer overflow attacks and apply countermeasures.
  11. Demonstrate an understanding of cryptography attacks, and use cryptanalysis tools.

  12. Demonstrate the ability to apply penetration testing and vulnerability assessment.
  13. Design a basic network with security and ethical structures properly in place.

Course Objectives

  1. Demonstrate an understanding of various types of footprinting and network scanning techniques.

    Learning Activity Artifact

    • Other (please fill out box below)
    • Final test

    Procedure for Assessing Student Learning

    • Other (please fill out box below)
    • Final test grading
  2. Distinguish computer viruses, worms, and Trojans, and apply countermeasures.
  3. Demonstrate an understanding of packet sniffing techniques and defend against sniffing.

    This objective is a course Goal Only

  4. Demonstrate an understanding of social engineering techniques and apply countermeasures.
  5. Demonstrate an understanding of denial of service attacks and apply countermeasures.
  6. Identify web server and SQL injection attacks, and apply countermeasures.
  7. Demonstrate the ability to apply system ethical hacking methodology.
  8. Demonstrate an understanding of wireless attacks and hacking, and apply security.
  9. Demonstrate the ability to apply firewall, IDS, and honeypot evasion techniques.

    This objective is a course Goal Only

  10. Demonstrate an understanding of buffer overflow attacks and apply countermeasures.
  11. Demonstrate an understanding of cryptography attacks, and use cryptanalysis tools.

  12. Demonstrate the ability to apply penetration testing and vulnerability assessment.
  13. Design a basic network with security and ethical structures properly in place.