CNIT 124
|
Catalog DescriptionAdvanced techniques of defeating computer security, and countermeasures to protect Windows and Unix/Linux systems. Hands-on labs include Google hacking, automated footprinting, sophisticated ping and port scans, privilege escalation, attacks against telephone and Voice over Internet Protocol (VoIP) systems, routers, firewalls, wireless devices, Web servers, and Denial of Service attacks.Prerequisites: CNIT 123. Upon successful completion of this course, the student will be able to:
TextbookHacking Exposed, Fifth Edition by Stuart McClure, Joel Scambray, and George Kurtz -- ISBN:0-07-226081-5 Buy from Amazon |
Schedule | ||||
---|---|---|---|---|
Date | Quiz | Topic | ||
Sat 1-19 | Ethical Principles & Ch 1: Advanced Footprinting | |||
Sat 1-26 | Ch 2: Advanced Scanning | |||
Fri 2-1 | Last Day to Add Classes | |||
Sat 2-2 | Quiz on Ch 1 & 2 Proj 1-3 due |
Ch 3: Advanced Enumeration | ||
Sat 2-9 | Quiz on Ch 3 Proj 4&5 due |
Ch 4: Hacking Windows (part 1) | ||
Sat 2-16 | Holiday - No Class | |||
Tue 2-19 | Last Day to Request CR/NC Grading | |||
Wed 2-20 | Last Day to Remove an Incomplete Grade | |||
Sat 2-23 | No Quiz Proj 6&7 due |
Ch 4: Hacking Windows (part 2) | ||
Sat 3-1 | Quiz on Ch 4 Proj 8&9 due |
Ch 5: Hacking Unix/Linux | ||
Sat 3-8 | Quiz on Ch 5 Proj 10&11 due |
Ch 6: Remote Connectivity and VoIP Hacking | ||
Sat 3-15 | Quiz on Ch 6 Proj 12&13 due |
Ch 7: Network Devices | ||
Sat 3-22 | Holiday - No Class | |||
Sat 3-29 | Holiday - No Class | |||
Sat 4-5 | Quiz on Ch 7 |
Ch 8: Advanced Wireless Hacking | ||
4-7 through 4-11 | RSA Security Conference (extra credit) | |||
Fri 4-11 | Last Day to Withdraw | |||
Sat 4-12 | Quiz on Ch 8 Proj 14 due |
Ch 9: Firewalls | ||
Sat 4-19 | Quiz on Ch 9 Proj 15 due |
Ch 10: Denial of Service (DoS) Attacks | ||
Sat 4-26 | Quiz on Ch 10 Proj 16&17 due |
Ch 11: Hacking Code | ||
Sat 5-3 | Quiz on Ch 11 Proj 18&19 due |
Ch 12: Web Hacking | ||
Sat 5-10 | Quiz on Ch 12 -- Last Class | Ch 13: Exploiting the Internet User | ||
Thu 5-15 | DEFCON Paper Submissions Due | |||
Sat 5-17 | Final Exam: 1 pm Room 215 | |||
Fri 8-10 through Sun 8-12 | DEFCON in Las Vegas |
Lectures | |
---|---|
Policy | |
Student Agreement | |
Code of Ethics | |
Ch 1: Footprinting Powerpoint | |
Ch 2: Scanning Powerpoint | |
Ch 3: Enumeration Powerpoint | |
Ch 4: Hacking Windows (Part 1) Powerpoint | |
Ch 4: Hacking Windows (Part 2) Powerpoint | |
Ch 5: Hacking Unix/Linux Powerpoint | |
Ch 6: Remote Connectivity and VoIP Hacking Powerpoint | |
Ch 7: Network Devices Powerpoint | |
Ch 8: Wireless Hacking Powerpoint | |
Ch 9: Firewalls Powerpoint | |
Ch 10: Denial of Service (DoS) Attacks Powerpoint | |
Ch 11: Hacking Code Powerpoint | |
Ch 12: Web Hacking Powerpoint | |
Ch 13: Exploiting the Internet User Powerpoint | |
The lectures are in Word and PowerPoint formats. If you do not have Word or PowerPoint you will need to install the Free Word Viewer 2003 and/or the Free PowerPoint Viewer 2003. |
Links |
---|
Links Organized by Textbook ChaptersLinks Organized by Certified Ethical Hacker v5 ChaptersLinking provided by Blogrolling |