Mission Statement:

advertisement
Wayland Baptist University
HAWAII CAMPUS SCHOOL
OF BUSINESS
SYLLABUS
Mission Statement:
Wayland Baptist University exists to educate students in an academically
challenging, learning-focused and distinctively Christian environment for professional success, and
service to God and humankind.
Course: MISM 4335 –HI01 Ethical Hacking
Term: Spring 2016 –February 25 –May 12, 2016
Instructor: Gary Teed
Office Phone and Wayland Email Address: 352-3231 – gary.teed@wayland.wbu.edu or
garyteed@aol.com
Office Hours: I am available before and after class or by appointment if you need help or have a
problem. Building and Location: Mililani Campus, Computer Lab
Class Meeting Time and Location: Thursday, 5:30-10:00PM, Mililani Computer Lab Classroom #8
Catalog Description: Course is designed to addresses various underlying principles and techniques
for detecting and responding to current and emerging computer security threats..
Prerequisites: MISM 3301 MISM 3304
Required Textbook:
BOOK
CEH Certified Ethical hacker
Bundle
AUTHOR
Walker
ED YEAR PUBLISHER
2
2015
McGraw Hill
ISBN#
UPDATED
9780071835602
5/26/16
Optional Materials: Lecture, case study and practical exercises will be used as appropriate. Information
other than in the text will be made available as necessary in class. Current events will be discussed
during class period.
Course Outcome Competencies: Upon completion of this course the student should be able to:











Describe the role of an ethical hacker
Explain the TCP/IP concepts
Describe the types of network attacks
Identify physical security attacks and vulnerabilities
Use Web tools for footprinting
Identify the types of social engineering
Describe port scanning and types of port scans
Describe the enumeration step of security testing
Enumerate OS targets
Describe vulnerabilities of the Windows and Linux operating systems
Explain techniques to harden systems against Windows and Linux vulnerabilities













Describe Web application vulnerabilities and the tools used to attack Web servers
Describe wireless networking standards
Describe the process of authentication
Describe wardriving
Describe wireless hacking and tools used by hackers and security professionals
Summarize the history and principles of cryptography
Describe symmetric and asymmetric encryption algorithms
Explain public key infrastructure (PKI)
Describe possible attacks on cryptosystems
Explain how routers are used as network protection systems
Describe firewall technology and tools for configuring firewalls and routers
Describe intrusion detection and prevention systems and Web-filtering technology
Explain the purpose of honeypots
Attendance Requirements: Attendance and oral participation are mandatory. All absences must be
explained to the instructor, who will determine whether to omitted work may be made up.
All Wayland students are expected to attend every class meeting; the minimum percentage of class
participation required to avoid receiving a grade of “F” in the class is 75%. Students who miss the
first two class meetings without providing a written explanation to the instructor will be
automatically dropped from the roster as a “no-show.” Students who know in advance that they will
be absent the first two class meetings and who wish to remain in the class must inform the
instructor in order to discuss possible arrangements for making up absences.
Statement on Plagiarism and Academic Dishonesty: Wayland Baptist University observes a zero tolerance
policy regarding academic dishonesty. Per university policy as described in the academic catalog, all cases
of academic dishonesty will be reported and second offenses will result in suspension from the university.
Disability Statement: “In compliance with the Americans with Disabilities Act of 1990 (ADA), it is
the policy of Wayland Baptist University that no otherwise qualified person with a disability be
excluded from participation in, be denied the benefits of, or be subject to discrimination under any
educational program or activity in the university. The Coordinator of Counseling Services serves as
the coordinator of students with a disability and should be contacted concerning accommodation
requests at (806) 291-3765. Documentation of a disability must accompany any request for
accommodations.”
Course Requirements: Students shall have protection through orderly procedures against prejudices
or capricious academic evaluation. A student who believes that he or she has not been held to
realistic academic standards, just evaluation procedures, or appropriate grading, may appeal the final
grade given in the course by using the student grade appeal process described in the Academic Catalog.
Appeals may not be made for advanced placement examinations or course bypass examinations.
Appeals are limited to the final course grade, which may be upheld, raised, or lowered at any stage of
the appeal process. Any recommendation to lower a course grade must be submitted through the
Executive Vice President/Provost to the Faculty Assembly Grade Appeals Committee for review and
approval. The Faculty Assembly Grade Appeals Committee may instruct that the course grade be
upheld, raised, or lowered to a more proper evaluation. When a student reaches that number of absences
considered by the instructor to be excessive, the instructor will so advise the student and file an
unsatisfactory progress report with the campus dean. Any student who misses 25 percent or more of
the regularly scheduled class meetings will receive a grade of F in the course. You will be expected to
keep up, or ahead, of the class schedule and assignments. Come prepared for quizzes, exams and
discussion of assignments for every class. It is YOUR RESPONSIBILITY to inform me in advance of
any problems, so that an alternative might be worked out. You will only be allowed to make up work
early if it is pre-approved with the instructor. If you have special learning needs please let me know
ahead of time. It is the University’s policy that no otherwise qualified person experiencing disabilities
be excluded from participation in, be denied the benefits of, or be subject to discrimination under and
educational program or activity in this University.
If a student has an impairment that would require additional accommodations by the instructor and/or
theUniversity, then please inform the instructor, or Center Director, beginning of the first class session.
GRADING
FINAL
200 PTS
A=600-540
Quiz’s
120 PTS
B=539-480
LABS
110 PTS
C=479-420
PROJECT
Homework
100 PTS
70 PTS
D= 419-360
F= Below360
Tentative Schedule:
CLASS DATE
Week
25
February
16
3 March
16
10 March
16
READING
Chapter
Chap 1
Chap 2
Chap 3-4
TOPIC
ASSIGNMENT
Topics

Security 101

Basic Networking

Security Essentials

Introduction to Ethical
Hacking

Hacking Terminology

The Ethical Hacker

Vulnerability Research

Footprinting

Passive Footprinting

Active Footprinting

DNS Footprinting

Determining Network Range

Google Hacking

Footprinting Tools

Scanning Fundamentals

Scanning Methodology

The TCP Handshake

Identifying Targets

Port Scanning

Enumeration

Windows System Basics

Enumeration Techniques

Passive and Active Sniffing

Sniffing Tools and
Techniques
Homework handout
provided in class. Chap 1
Homework handout
provided in class. Chap 2
Quiz Chapter 1
Homework handout
provided in class. Chap
3/4
Quiz Chapter 2
17 March
16
24 March
16
31 March
16

Wireshark

Other Tools

Evasion

IDS

Firewalls
Spring Break
Chap 5
Chap 6

Windows Security
Architecture

Linux Security Architecture

Cracking Passwords

Password 101

Password Attacks

Privilege Escalation and
Executing Applications

Privilege Escalation

Executing Applications

Stealth

Hiding Files and Activity

Covering Your Tracks

Attacking Web Servers

Web Server Architecture

Attack Methodology

Web Server Attacks

Attacking Web Applications

Web Application Architecture

Application Attacks

SQL Injection
Homework handout
provided in class. Chap 5
Quiz Chapter 3/4
Homework handout
provided in class. Chap 6
Quiz Chapter 5
7 April 16
14 April
16
21 April
16
28 April
16
Chap 7
Chap 8
Chap 9
Chap 10

Wireless Architecture and
Standards

Finding and Identifying
Wireless Networks

Wireless Hacking

Wireless Attacks

Mobile Platform Attacks

The “Malware” Attacks

Trojans, Backdoors, Viruses,
and Worms

Remaining Attacks

Denial of Service

Session Hijacking

Encryption Algorithms and
Techniques

PKI, the Digital Certificate,
and Digital Signatures

The PKI System

Digital Certificates

Digital Signatures

Encrypted Communication
and Cryptography Attacks

Data Encryption: At Rest and
While Communicating

Cryptography Attacks

Social Engineering

Human-Based Attacks

Computer-Based Attacks

Mobile-Based Attacks
Homework handout
provided in class. Chap 7
Quiz Chapter 6
Homework handout
provided in class. Chap 8
Quiz Chapter 7
Homework handout
provided in class. Chap 9
Quiz Chapter 8
Homework handout
provided in class. Chap 10
Quiz Chapter 9
5 May 16
12 May
16
Chap 11

Physical Security

Physical Security 101

The Security Assessments

Security Assessment
Deliverables

Miscellaneous Information

Guidelines

More Terminology
Final Exam Chap 1 -11
Homework handout
provided in class. Chap 11
Quiz Chapter 10
Download