CNIT 123
Ethical Hacking and Network Defense

Spring 2025

Sam Bowne and Elizabeth Biddlecome

Lecture Videos · Slides · Projects · Student Resources

Textbook

3rd Ed: Rent ($60-80) · Rent ($60-80)
2012 Ed: Buy ($16) Buy ($30)


Catalog Description

ADVISE: CNIT 106 or 120 or 201C

Learn how hackers attack computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. CSU

Learn about attacks and how to defend Windows and Linux systems.

Student Learning Outcomes

After successful completion of this course, students will be able to:
  1. Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers.
  2. Perform reconnaissance on a target network using a variety of scanning and probing techniques.
  3. Enumerate and classify Microsoft and Linux Operating Systems vulnerabilities.
  4. Take control of Web Servers and wireless networks, and protect them.
  5. Evaluate and select cryptography and hashing methods, and perform attacks against them.
  6. Select and implement security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.

Textbook

Hands-On Ethical Hacking and Network Defense, Third Edition by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610

Lecture Videos

Bitcoin & Lockpicking

Ch 1: Ethical Hacking Overview
Ch 2: TCP/IP Concepts Review

Ch 3: Network and Computer Attacks

Ch 4: Footprinting and Social Engineering

Ch 5: Port Scanning

Ch 6: Enumeration

Ch 7: Programming for Security Professionals

Ch 8: Desktop and Server OS Vulnerabilites

Ch 9: Embedded Operating Systems: The Hidden Threat

Ch 10: Hacking Web Servers

Ch 11: Hacking Wireless Networks & Ch 12: Cryptography

Slides

Bitcoin and Blockchains · KEY · PDF

Security Training at CCSF · KEY · PDF

Lecture videos from last semester

Ch 1: Ethical Hacking Overview · KEY · PDF
Ch 2: TCP/IP Concepts Review · KEY · PDF
Ch 3: Network and Computer Attacks · KEY · PDF
Ch 4: Footprinting and Social Engineering · KEY · PDF
Ch 5: Port Scanning · KEY · PDF
Ch 6: Enumeration · KEY · PDF (Updated 3-3-18)
Ch 7: Programming for Security Professionals · KEY · PDF
Ch 8: Desktop and Server OS Vulnerabilites · KEY · PDF
Ch 9: Embedded Operating Systems: The Hidden Threat · KEY · PDF
Ch 10: Hacking Web Servers · KEY · PDF
Ch 11: Hacking Wireless Networks · KEY · PDF
Ch 12: Cryptography · KEY · PDF (rev. 11-22-17)
Ch 13: Network Protection Systems · KEY · PDF

Updated: 11-16-24