CNIT 123
|
Catalog DescriptionStudents learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.Prerequisites: Familiarity with the fundamentals of networking and security, at the Network+ and Security+ level. Upon successful completion of this course, the student will be able to:
TextbookHands-On Ethical Hacking and Network Defense by Simpson, Blackman, Corey-- ISBN: 1133935613 Buy from Amazon ($25) |
Schedule (may be revised) | ||||
---|---|---|---|---|
Date | Topic | |||
Monday, June 3 | Ch 1: Ethical Hacking Overview & The Security Circus Ch 2: TCP/IP Concepts Review | |||
Tuesday, June 4 | Ch 3: Network and Computer Attacks Ch 4: Footprinting and Social Engineering Ch 5: Port Scanning | |||
Wednesday, June 5 | Ch 6: Enumeration Ch 7: Programming for Security Professionals Wardriving Ch 8: Desktop and Server OS Vulnerabilites | |||
Thursday, June 6 | Ch 9: Embedded Operating Systems: The Hidden Threat Ch 10: Hacking Web Servers Cracking WEP Ch 11: Hacking Wireless Networks | |||
Friday, June 7 | Ch 12: Cryptography Ch 13: Network Protection Systems |
Lecture Notes | |
---|---|
Policy | |
Student Agreement | |
Code of Ethics | |
Ch 1: Ethical Hacking Overview Powerpoint | |
The Security Circus | |
Ch 2: TCP/IP Concepts Review Powerpoint | |
Ch 3: Network and Computer Attacks Powerpoint | |
Ch 4: Footprinting and Social Engineering Powerpoint | |
Ch 5: Port Scanning Powerpoint | |
Ch 6: Enumeration Powerpoint | |
Ch 7: Programming for Security Professionals Powerpoint | |
Ch 8: Desktop and Server OS Vulnerabilites Powerpoint | |
Ch 9: Embedded Operating Systems: The Hidden Threat Powerpoint | |
Ch 10: Hacking Web Servers Powerpoint | |
Ch 11: Hacking Wireless Networks Powerpoint | |
Ch 12: Cryptography Powerpoint | |
Ch 13: Network Protection Systems Powerpoint | |
iClicker PowerPoints | |
The lectures are in Word and PowerPoint formats. If you do not have Word or PowerPoint you will need to install the Free Word Viewer 2003 and/or the Free PowerPoint Viewer 2003. |