CNIT 123
|
![]() |
36684 601 Lec SAT 09:10-12:00PM SCIE 200
|
Catalog DescriptionStudents learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals of networking and security. Upon successful completion of this course, the student will be able to:
TextbooksHands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613 |
Schedule (may be revised) | ||||
---|---|---|---|---|
Date | Quiz | Topic | ||
Sat 1-17 | Ch 1: Ethical Hacking Overview & When Vulnerability Disclosure Gets Ugly | |||
Sat 1-24 | Ch 2: TCP/IP Concepts Review | |||
Fri 1-30 | Last Day to Add Classes | |||
Sat 1-31 | Ch 3: Network and Computer Attacks | |||
Sat 2-7 | Quiz on Ch 1-3 Proj 1-3 due * |
Ch 4: Footprinting and Social Engineering | ||
Sat 2-14 | Holiday - No Class | |||
Sat 2-21 | Quiz on Ch 4 Proj 4 & 5 due |
Ch 5: Port Scanning | ||
Sat 2-28 | Quiz on Ch 5 Proj 6 & 7 due |
Ch 6: Enumeration | ||
Sat 3-7 | Quiz on Ch 6 Proj 8 & 9 due |
Ch 7: Programming for Security Professionals | ||
Sat 3-14 | Quiz on Ch 7 Proj 10 & 11 due |
Ch 8: Desktop and Server OS Vulnerabilites | ||
Sat 3-21 | Quiz on Ch 8 |
Ch 9: Embedded Operating Systems: The Hidden Threat | ||
Wed 3-25 | Mid-Term Grades Due | |||
Sat 3-28 | Quiz on Ch 9 Proj 12 & 14 & 15 Due * |
Ch 10: Hacking Web Servers | ||
Sat 4-4 | Holiday - No Class | |||
Sat 4-11 | Quiz on Ch 10 Proj 13 & 16 & 17 due |
Ch 11: Hacking Wireless Networks | ||
Tue 4-17 | Last Day to Withdraw | |||
Sat 4-18 | Quiz on Ch 11 Proj 18 & 19 due |
Ch 12: Cryptography | ||
Sat 4-25 | Wardriving 9 AM SCIE 200 No Quiz, no Proj due |
|||
Sat 5-2 | Quiz on Ch 12 Proj 20 & 21 due |
Ch 13: Network Protection Systems | ||
Sat 5-9 |
All Extra Credit Proj due Proj 22 due **, No Quiz |
| ||
Sat 5-16 | Final Exam | |||
* Project requires DVD--available in S214 ** Project requires machine with a special wireless card--available in S214 |
Lecture Notes | |
---|---|
Policy | |
Student Agreement | |
Code of Ethics | |
When Vulnerability Disclosure Gets Ugly | |
The chapter lectures are password-protected becauseCh 1: Ethical Hacking Overview Powerpoint | |
Ch 2: TCP/IP Concepts Review Powerpoint | |
Ch 3: Network and Computer Attacks Powerpoint | |
Ch 4: Footprinting and Social Engineering Powerpoint | |
Ch 5: Port Scanning Powerpoint | |
Ch 6: Enumeration Powerpoint | |
Ch 7: Programming for Security Professionals Powerpoint | |
Ch 8: Desktop and Server OS Vulnerabilites Powerpoint | |
Ch 9: Embedded Operating Systems: The Hidden Threat Powerpoint | |
Ch 10: Hacking Web Servers Powerpoint | |
Ch 11: Hacking Wireless Networks Powerpoint | |
Ch 12: Cryptography Powerpoint | |
Ch 13: Network Protection Systems Powerpoint | |
The lectures are inPowerPoint format. |