CNIT 123
|
![]() |
72250 Thu 6:10 - 9:00 pm SCIE 200
|
Catalog DescriptionADVISE: CNIT 106 or 120 or 201CLearn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. CSU Learn about attacks and how to defend Windows and Linux systems. After successful completion of this course, students will be able to: Outcome 1: Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers. TextbookHands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613 Buy from Amazon ($29) |
Schedule | |||
---|---|---|---|
Date | Quiz | Topic | |
Thu 8-18 | Ch 1: Ethical Hacking Overview | ||
Thu 8-25 | Ch 2: TCP/IP Concepts Review | ||
Thu 9-1 | Ch 3: Network and Computer Attacks | ||
Fri 9-2 | Last Day to Add Classes | ||
Thu 9-8 | Quiz on Ch 1-3 | Ch 4: Footprinting and Social Engineering | |
| |||
Thu 9-15 | Quiz on Ch 4 Proj 1 & 2 due |
Ch 5: Port Scanning | |
Thu 9-22 | Quiz on Ch 5 Proj 3-5 due |
Ch 6: Enumeration | |
Thu 9-29 | Quiz on Ch 6 Proj 6 & 7 due |
Ch 7: Programming for Security Professionals | |
Thu 10-6 | Quiz on Ch 7 Proj 8 & 9 |
Ch 8: Desktop and Server OS Vulnerabilites | |
Thu 10-13 | Quiz on Ch 8 Proj 10 due |
Ch 9: Embedded Operating Systems: The Hidden Threat | |
| |||
Thu 10-20 | Quiz on Ch 9 Proj 11 & 12 & 13 Due |
Ch 10: Hacking Web Servers | |
Mon 10-24 | Mid-Term Grades Due | ||
Thu 10-27 | Quiz on Ch 10 Proj 14 & 15 due |
Ch 11: Hacking Wireless Networks | |
Thu 11-3 | Quiz on Ch 11 Proj 16 & 17 due |
Ch 12: Cryptography | |
Thu 11-10 | Quiz on Ch 12 Proj 18 & 19 due |
Ch 13: Network Protection Systems | |
Thu 11-17 | No Quiz Proj 20 & due |
Open Lab | |
Thu 11-24 | Holiday: No Class | ||
Thu 12-1 | No Quiz No Proj due |
Guest speaker cancelled; I'll demonstrate
Try-CybSI
More extra credit projects | |
Thu 12-8 |
All Extra Credit Proj due Proj 21 & 22 due, No Quiz |
![]()
Last Class: Guest Speakers from The Gap Cybersecurity Division |
|
Thu 12-15 | Final Exam | ||
Slides | |
---|---|
Policy | |
Student Agreement | |
Code of Ethics | |
Security Training at CCSF · KEY · PDF | |
Ch 1: Ethical Hacking Overview · KEY · PDF | |
Ch 2: TCP/IP Concepts Review Powerpoint | |
Ch 3: Network and Computer Attacks · KEY · PDF | |
Ch 4: Footprinting and Social Engineering · KEY · PDF | |
Ch 5: Port Scanning HTML KEY | |
Ch 6: Enumeration · KEY · PDF | |
Ch 7: Programming for Security Professionals · KEY · PDF | |
Ch 8: Desktop and Server OS Vulnerabilites · KEY · PDF | |
Ch 9: Embedded Operating Systems: The Hidden Threat · KEY · PDF | |
Ch 10: Hacking Web Servers HTML KEY | |
Ch 11: Hacking Wireless Networks HTML KEY | |
Ch 12: Cryptography HTML KEY | |
Ch 13: Network Protection Systems · KEY · PDF | |
Click a lecture name to see it on SlideShare. If you want to use other formats, you may find this useful: Cloud Convert. |