CNIT 123
|
|
36684 Wed 6:10 - 9:00 pm SCIE 37
|
Catalog DescriptionStudents learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.Prerequisites: CNIT 106 and 120 or equivalent familiarity with the fundamentals of networking and security. Upon successful completion of this course, the student will be able to:
Student Learning Outcomes (measured to guide course improvements)Perform port scans to locate potential entry points to servers and networks.Perform very simple scripting and coding tasks, specifically oriented towards the needs of network security professionals. Locate and hack into wireless networks, and protect them. TextbooksHands-On Ethical Hacking and Network Defense, Second Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 1133935613 Buy from Amazon ($29) |
Schedule | ||||
---|---|---|---|---|
Date | Quiz | Topic | ||
Wed 1-20 | Ch 1: Ethical Hacking Overview | |||
Wed 1-27 | Ch 2: TCP/IP Concepts Review | |||
Wed 2-3 | Ch 3: Network and Computer Attacks | |||
Fri 2-5 | Last Day to Add Classes | |||
Wed 2-10 | Quiz on Ch 1-3 Proj 1-3 due |
Ch 4: Footprinting and Social Engineering | ||
Wed 2-17 | Quiz on Ch 4 Proj 4 & 5 due |
Ch 5: Port Scanning | ||
Wed 2-24 | Quiz on Ch 5 Proj 6 & 7 due |
Ch 6: Enumeration | ||
Wed 3-2 | Quiz on Ch 6 Proj 8 & 9 due |
Ch 7: Programming for Security Professionals | ||
Wed 3-9 | Quiz on Ch 7 Proj 10 & 11 |
Ch 8: Desktop and Server OS Vulnerabilites | ||
Wed 3-16 | Quiz on Ch 8 Proj 12 & 13 due |
Ch 9: Embedded Operating Systems: The Hidden Threat | ||
Wed 3-23 | Quiz on Ch 9 Proj 14 & 15 Due |
Ch 10: Hacking Web Servers | ||
Wed 3-30 | Holiday - No Class | |||
Wed 4-6 | Mid-Term Grades Due | |||
Wed 4-6 | Quiz on Ch 10 Proj 16 & 17 due |
Ch 11: Hacking Wireless Networks | ||
Wed 4-13 | Quiz on Ch 11 Proj 18 & 19 due |
Ch 12: Cryptography | ||
Wed 4-20 |
Guest Speaker: Sam Houston from BugCrowd No Quiz, No Project Due | |||
Wed 4-27 |
No Class: CCSF on Strike You may want to attend the Privacy Lab - Encryption vs the FBI | |||
Wed 5-4 | Quiz on Ch 12 Proj 20 due |
Ch 13: Network Protection Systems | ||
Wed 5-11 | No Quiz Proj 21 due |
CTF Workshop: picoCTF & Bugcrowd CTF | ||
Wed 5-18 |
All Extra Credit Proj due Proj 22 due, No Quiz |
Last Class: CTF Workshop: picoCTF & Bugcrowd CTF | ||
Wed 5-25 | Final Exam |
Lecture Notes | |
---|---|
Policy | |
Student Agreement | |
Code of Ethics | |
Stupid Whitehat Tricks in the HOPE X Section Here | |
The chapter lectures are password-protected becauseCh 1: Ethical Hacking Overview Powerpoint | |
Ch 2: TCP/IP Concepts Review Powerpoint | |
Ch 3: Network and Computer Attacks Powerpoint | |
Ch 4: Footprinting and Social Engineering Powerpoint | |
Ch 5: Port Scanning HTML KEY | |
Ch 6: Enumeration Powerpoint | |
Ch 7: Programming for Security Professionals Powerpoint | |
Ch 8: Desktop and Server OS Vulnerabilites HTML KEY | |
Ch 9: Embedded Operating Systems: The Hidden Threat HTML KEY | |
Ch 10: Hacking Web Servers HTML KEY | |
Ch 11: Hacking Wireless Networks HTML KEY | |
Ch 12: Cryptography HTML KEY | |
Ch 13: Network Protection Systems HTML KEY | |
The lectures are in Keynote and HTML formats. |