CNIT 123
|
72250 Wed 6-9 SCIE 204 |
Catalog DescriptionStudents learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals of networking and security. Upon successful completion of this course, the student will be able to:
TextbooksHands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson -- ISBN: 1435486099 Buy from AmazonCNIT 123: Ethical Hacking and Network Defense -- Projects (Fall 2011) by Sam Bowne (buy it at the CCSF Bookstore) |
Schedule (may be revised) | ||||
---|---|---|---|---|
Date | Quiz | Topic | ||
Wed 8-17 | Ch 1: Ethical Hacking Overview & The Security Circus | |||
Wed 8-24 | Ch 2: TCP/IP Concepts Review | |||
Wed 8-31 | Ch 3: Network and Computer Attacks | |||
Fri 9-2 | Last Day to Add Classes | |||
Wed 9-7 | Quiz on Ch 1-3 Proj 1-3 due |
Ch 4: Footprinting and Social Engineering | ||
Wed 9-14 | Quiz on Ch 4 Proj 4 & 5 due |
Ch 5: Port Scanning | ||
Thu 9-15 | Last Day to Request Pass/No Pass Grading | |||
Wed 9-21 | Quiz on Ch 5 Proj 7 due |
Ch 6: Enumeration | ||
Wed 9-28 | Quiz on Ch 6 Proj 6 & 9 due |
Ch 7: Programming for Security Professionals | ||
Wed 10-5 | Quiz on Ch 7 Proj 8 & 10 & 11 due |
Ch 8: Desktop and Server OS Vulnerabilites | ||
Wed 10-12 | Quiz on Ch 8 Proj 12 & 13 due |
Ch 9: Embedded Operating Systems: The Hidden Threat | ||
Wed 10-19 | Quiz on Ch 9 Proj 14 & 15 due |
Ch 10: Hacking Web Servers | ||
Tue 10-25 | Mid-Term Grades Due | |||
Wed 10-26 | Quiz on Ch 10 Proj 16 & 17 due |
Ch 11: Hacking Wireless Networks | ||
Wed 11-2 | Wardriving No Quiz No Proj due |
|||
Wed 11-9 | Quiz on Ch 11 Proj 18 & 19 due |
Ch 12: Cryptography | ||
Wed 11-16 | Quiz on Ch 12 Proj 20 & 21 due |
Ch 13: Network Protection Systems | ||
Wed 11-23 | Holiday - No Class | |||
Wed 11-30 | No Quiz No Proj due |
Guest Speaker: Brett Hardin | ||
Wed 12-7 | Last Class; No Quiz Proj 22 due All Extra Credit Projects Due |
Guest Speaker: FBI Agent on Cooperating with Law Enforcement | ||
Wed 12-14 | Final Exam: 6 pm SCIE 204 |
Lecture Notes | |
---|---|
Policy | |
Student Agreement | |
Code of Ethics | |
Ch 1: Ethical Hacking Overview Powerpoint | |
The Security Circus | |
Ch 2: TCP/IP Concepts Review Powerpoint | |
Ch 3: Network and Computer Attacks Powerpoint | |
Ch 4: Footprinting and Social Engineering Powerpoint | |
Ch 5: Port Scanning Powerpoint | |
Ch 6: Enumeration Powerpoint | |
Ch 7: Programming for Security Professionals Powerpoint | |
Ch 8: Desktop and Server OS Vulnerabilites Powerpoint | |
Ch 9: Embedded Operating Systems: The Hidden Threat Powerpoint | |
Ch 10: Hacking Web Servers Powerpoint | |
Ch 11: Hacking Wireless Networks Powerpoint | |
Ch 12: Cryptography Powerpoint | |
Ch 13: Network Protection Systems Powerpoint | |
The lectures are in Word and PowerPoint formats. If you do not have Word or PowerPoint you will need to install the Free Word Viewer 2003 and/or the Free PowerPoint Viewer 2003. |
Guest Speaker |
---|
Brett HardinBrett Hardin is an information security professional who has had numerous titles in his career including Penetration Tester, Software Developer, and Product Manager. In these roles he has performed numerous security related projects including: network, application, web-application, source code, wireless, internet, intranet, dial-up and social engineering security reviews for various clients in the Fortune 500.Brett is currently getting his hands dirty by securing the code that developers write.
Brett holds a Bachelor's Degree in Computer Science from California State University at Chico and is a co-author of Hacking: The Next Generation. Brett also is a co-author of SpotTheVuln.com
|