11/21/2024 1:11:50 AM |
| New Course (First Version) |
CATALOG INFORMATION
|
Discipline and Nbr:
CS 82.71 | Title:
ETHICAL HACKING |
|
Full Title:
Ethical Hacking and Systems Defense |
Last Reviewed:5/10/2021 |
Units | Course Hours per Week | | Nbr of Weeks | Course Hours Total |
Maximum | 3.00 | Lecture Scheduled | 3.00 | 17.5 max. | Lecture Scheduled | 52.50 |
Minimum | 3.00 | Lab Scheduled | 0 | 8 min. | Lab Scheduled | 0 |
| Contact DHR | 0 | | Contact DHR | 0 |
| Contact Total | 3.00 | | Contact Total | 52.50 |
|
| Non-contact DHR | 0 | | Non-contact DHR Total | 0 |
| Total Out of Class Hours: 105.00 | Total Student Learning Hours: 157.50 | |
Title 5 Category:
AA Degree Applicable
Grading:
Grade or P/NP
Repeatability:
00 - Two Repeats if Grade was D, F, NC, or NP
Also Listed As:
Formerly:
Catalog Description:
Untitled document
This course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. Learn how hackers penetrate computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. The course will help students prepare for the EC-Council "Certified Ethical Hacker" certification exams.
Prerequisites/Corequisites:
Course Completion of CS 81.21 and CS 82.58 (or CS 82.55)
Recommended Preparation:
Eligibility for ENGL 100 or ESL 100
Limits on Enrollment:
Schedule of Classes Information
Description:
Untitled document
This course combines an ethical hacking methodology with the hands-on application of security tools to better help students secure their systems. Students are introduced to common countermeasures that effectively reduce and/or mitigate attacks. Learn how hackers penetrate computers and networks, and how to protect Windows and Linux systems. Legal restrictions and ethical guidelines will be taught and enforced. The course will help students prepare for the EC-Council "Certified Ethical Hacker" certification exams.
(Grade or P/NP)
Prerequisites:Course Completion of CS 81.21 and CS 82.58 (or CS 82.55)
Recommended:Eligibility for ENGL 100 or ESL 100
Limits on Enrollment:
Transfer Credit:CSU;
Repeatability:00 - Two Repeats if Grade was D, F, NC, or NP
ARTICULATION, MAJOR, and CERTIFICATION INFORMATION
Associate Degree: | Effective: | | Inactive: | |
Area: | | |
|
CSU GE: | Transfer Area | | Effective: | Inactive: |
|
IGETC: | Transfer Area | | Effective: | Inactive: |
|
CSU Transfer: | Transferable | Effective: | Fall 2022 | Inactive: | |
|
UC Transfer: | | Effective: | | Inactive: | |
|
C-ID: |
Certificate/Major Applicable:
Both Certificate and Major Applicable
Approval and Dates
Version: | 01 | Course Created/Approved: | 5/10/2021 |
Version Created: | 4/30/2019 | Course Last Modified: | 6/2/2024 |
Submitter: | Michael McKeever | Course Last Full Review: | 5/10/2021 |
Version Status: | Approved New Course (First Version) | Prereq Created/Approved: | 5/10/2021 |
Version Status Date: | 5/10/2021 | Semester Last Taught: | Spring 2024 |
Version Term Effective: | Fall 2022 | Term Inactive: | |
COURSE CONTENT
Student Learning Outcomes:
At the conclusion of this course, the student should be able to:
Untitled document
1. Demonstrate the ability to attack and defend a network
2. Investigate how to attack a computer system
3. Perform penetration testing
Objectives:
Untitled document
At the conclusion of this course, the student should be able to:
1. Utilize various information security tools given different target systems in different
environments.
2. Discuss how the tools interrelate with each other in an overall penetration testing process.
3. Implement countermeasures for various types of attacks.
4. Apply a common ethical hacking methodology to carry out a penetration test.
5. Analyze how penetration testing and ethical hacking fit into a comprehensive enterprise
information security program.
6. Demonstrate ethical behavior appropriate to security-related technologies.
Topics and Scope
Untitled document
I. Ethical Hacking Overview
II. Transmission Control Protocol/Internet Protocol (TCP/IP) Concepts Review
III. Network and Computer Attacks
IV. Footprinting and Social Engineering
V. Port Scanning
VI. Enumeration
VII. Programming for Security Professionals
VIII. Embedded Operating Systems
IX. Linux Operating System Vulnerabilities
X. Penetration Testing
A. Hacking Web Servers
B. Hacking Wireless Networks
XI. Cryptography
XII. Protecting Networks with Security Devices
Assignments:
Untitled document
Reading assignments include:
1. Online research of hacking tools and techniques
2. Approximately 50 pages weekly from the textbook
Homework problems include:
1. Weekly written online discussion thread participation
2. Hands-on exercises to demonstrate proficiency with topics
3. Online quizzes (5 - 12)
4. Assignments for hacking various system environments
Other assignments include:
1. Skill demonstration examinations
2. Classroom scenario-based exercises
Methods of Evaluation/Basis of Grade.
Writing: Assessment tools that demonstrate writing skill and/or require students to select, organize and explain ideas in writing. | Writing 5 - 10% |
Weekly written online discussions | |
Problem solving: Assessment tools, other than exams, that demonstrate competence in computational or non-computational problem solving skills. | Problem Solving 15 - 30% |
Homework problems, assignments for hacking various system environments | |
Skill Demonstrations: All skill-based and physical demonstrations used for assessment purposes including skill performance exams. | Skill Demonstrations 20 - 30% |
Class performances of hacking techniques and skill demonstration examinations | |
Exams: All forms of formal testing, other than skill performance exams. | Exams 20 - 30% |
Quizzes and skill demonstration examinations | |
Other: Includes any assessment tools that do not logically fit into the above categories. | Other Category 5 - 20% |
Attendance and participation in scenario-based exercises | |
Representative Textbooks and Materials:
Untitled document
CEH Certified Ethical Hacker Bundle. 4th ed. Walker, Matt. McGraw-Hill Education. 2019
Ethical Hacking and Systems Defense: National CyberWatch Center Edition. Oriyano, Sean-Philip. Jones & Bartlett Learning. 2016 (classic)
Hands-On Ethical Hacking and Network Defense. 3rd ed. Simpson, Michael T. and Antill, Nicholas. Cengage Press. 2017 (classic)
OTHER REQUIRED ELEMENTS
Student Preparation |
Matric Assessment Required: | E | Requires English Assessment |
Prerequisites-generate description: | U | User Generated Text |
Advisories-generate description: | A | Auto-Generated Text |
Prereq-provisional: | N | NO |
Prereq/coreq-registration check: | Y | Prerequisite Rules Exist |
Requires instructor signature: | N | Instructor's Signature Not Required |
| | |
BASIC INFORMATION, HOURS/UNITS & REPEATABILITY |
Method of instruction: | 02 | Lecture |
| 50 | Distance Education, Delayed Interaction |
| 71 | Internet-Based, Simultaneous Interaction |
| 72 | Internet-Based, Delayed Interaction |
Area department: | CS | Computer Studies |
Division: | 72 | Arts & Humanities |
Special topic course: | N | Not a Special Topic Course |
Program Status: | 1 | Both Certificate and Major Applicable |
Repeatability: | 00 | Two Repeats if Grade was D, F, NC, or NP |
Repeat group id: | | |
| | |
SCHEDULING |
Audit allowed: | N | Not Auditable |
Open entry/exit: | N | Not Open Entry/Open Exit |
Credit by Exam: | N | Credit by examination not allowed |
Budget code: Program: | 0000 | Unrestricted |
Budget code: Activity: | 0701 | Computer & Information Science |
| | |
OTHER CODES |
Disciplines: | Computer Information Systems |
Basic Skills: | N | Not a Basic Skills Course |
Level below transfer: | Y | Not Applicable |
CVU/CVC status: | Y | Distance Ed, Not CVU/CVC Developed |
Distance Ed Approved: | Y | Either online or hybrid, as determined by instructor |
Emergency Distance Ed Approved: | N | |
Credit for Prior Learning: | N | Agency Exam |
| N | CBE |
| N | Industry Credentials |
| N | Portfolio |
Non-credit category: | Y | Not Applicable, Credit Course |
Classification: | Y | Career-Technical Education |
SAM classification: | C | Clearly Occupational |
TOP code: | 0708.00 | Computer Infrastructure and Support |
Work-based learning: | N | Does Not Include Work-Based Learning |
DSPS course: | N | NO |
In-service: | N | Not an in-Service Course |
Print PDF