Hands-On Ethical Hacking and Network Defense

advertisement

Hands-On Ethical Hacking and Network Defense Syllabus

Hands-On Ethical Hacking and Network Defense

Spring, 2011

General Course Information

Instructor: Kevin Riley

Office: Orange Coast College IT Bldg room 116E

Office Hours: Official Hrs 3:00 pm – 5:00 pm T TH

Phone: 714-432-5949

E-mail: kriley@occ.cccd.edu

Web site: http://www.coastline.edu

Classroom: Room 302 Garden Grove CTR

Class Times: Weds. 6- 10:10pm

Prerequisites: Should have a basic understanding of computers and computer networking.

Be proficient with an Operating system like Window XP or Linux (Ubuntu). Should understand what the IP stack is and how to configure the TCP/IP settings. Should Have a

Basic understanding of http, ftp, telnet, ssh, ICMP protocols.

Textbook: Michael Simpson, Hands-On Ethical Hacking and Network Defense Second Edition. Course

Technology Incorporated, 2011, ISBN-13 978-1-4354-8609-6

Course Objectives

With the threats of cyber terrorism and corporate espionage increasing, the need for trained network security professionals continues to grow. This course covers penetration-testing tools and techniques that ethical hackers and security testers use to protect computer networks. This course provides a structured knowledge base for preparing security professionals to discover vulnerabilities and recommend solutions for tightening network security and protecting data from potential attackers.

Specific topic coverage includes:

▪ Ethical Hacking Overview

▪ TCP/IP Concepts Review

Network and Computer Attacks

▪ Foot printing and Social Engineering

▪ Port Scanning

▪ Enumeration

Programming for Security Professionals

▪ Microsoft Operating System Vulnerabilities

▪ Linux Operating System Vulnerabilities

▪ Hacking Web Servers

Hacking Wireless Networks

▪ Cryptography

▪ Protecting Networks with Security Devices

1

Hands-On Ethical Hacking and Network Defense Syllabus

Web Site

Supplementary information for the course is available at your Seaport Site. The Web site contains class notes,

PowerPoint slides, class announcements, the course syllabus, test dates, and other information for the course.

E-Mail

All students are requested to obtain an e-mail account. If you have any questions about the course or need assistance, please contact me in person or by telephone during office hours; or by e-mail at any time. Also, you may submit the end-of-chapter case project assignments in class on the due date or by e-mail with a date stamp at or before

5:00 P.M. on the due date. E-mail submissions should be submitted as an attachment in Microsoft Word format.

Grading and Evaluation Criteria

50% of the grade is based on a midterm and a final examination. Both examinations are cumulative and given in a varied format. An in-class review will be held prior to each examination.

40% of the grade is based on quizzes. There will be a quiz each day covering the previous weeks material. These must be taken the day they are given. No make-ups.

10% On Attendance

Class Policies:

You are at no time allowed or given any permission to use the tools described in this course against any computer within the Coastline Community College District. Furthermore, you are not authorized to use the tools in this course against any computer or network outside the Coast Community College District that you do not own or have

EXPRESS WRITEN PERMISSION to do so. If you are found in violation of this policy you will be immediately dismissed from the course and reported to the Dean of students.

If you would like to discuss a tool not covered in this course, DO NOT bring it to class unless you have discussed it with the Instructor first. I realize there are many tools out there and some may be very relevant to our discussion but some tools may be considered Illegal to possess and therefore should be discuss with the instructor first.

There will be no allowance made for missed exams. If you miss an exam you will NOT have the opportunity to make it up. There will be no exceptions. Review the exam dates and make sure that you will be available.

After each Chapter is covered there will be a short 10 question quiz given at the beginning of the following week.

These can only be made up that day. For instance, if you are an hour late to class due to work or traffic issues, you may still take the quiz.

Every student is expected to act with respect to his/her fellow students. It’s the hope of the instructor that the class environment be open for stimulating discussion. Demeaning or “elitist” attitudes will not be tolerated.

2

Hands-On Ethical Hacking and Network Defense

16-Week Course Schedule

10

11

12

13

14

15

16

5

6

7

8

9

1

2

3

4

Week Topics

Ethical Hacking Overview

TCP/IP Concepts Review

Network and Computer Attacks

Foot printing and Social Engineering

Port Scanning

Enumeration

Programming for Security Professionals – Review For Exam

Mid-Term Exam - No Lecture

Desktop and Server OS Vulnerabilities

Embedded Operating Systems

Hacking Web Servers

Hacking Wireless Networks

Cryptography

Network Protection Systems

Review – Final Lab

Final Exam – No Lecture/Lab

Chapter

Readings

Chapter 1

Chapter 2

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Exam

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Chapter 12

Chapter 13

Review

Exam

Syllabus

Date

Feb 3

Feb 10

Feb 17

Feb 24

March 3

March 10

March 17

March 24

April 7

April 14

April 21

April 28

May 5

May 12

May 19

May 26

3

Download