Wayland Baptist University HAWAII CAMPUS SCHOOL OF BUSINESS SYLLABUS Mission Statement: Wayland Baptist University exists to educate students in an academically challenging, learning-focused and distinctively Christian environment for professional success, and service to God and humankind. Course: MISM 4335 –HI01 Ethical Hacking Term: Spring 2016 –February 25 –May 12, 2016 Instructor: Gary Teed Office Phone and Wayland Email Address: 352-3231 – gary.teed@wayland.wbu.edu or garyteed@aol.com Office Hours: I am available before and after class or by appointment if you need help or have a problem. Building and Location: Mililani Campus, Computer Lab Class Meeting Time and Location: Thursday, 5:30-10:00PM, Mililani Computer Lab Classroom #8 Catalog Description: Course is designed to addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats.. Prerequisites: MISM 3301 MISM 3304 Required Textbook: BOOK CEH Certified Ethical hacker Bundle AUTHOR Walker ED YEAR PUBLISHER 2 2015 McGraw Hill ISBN# UPDATED 9780071835602 5/26/16 Optional Materials: Lecture, case study and practical exercises will be used as appropriate. Information other than in the text will be made available as necessary in class. Current events will be discussed during class period. Course Outcome Competencies: Upon completion of this course the student should be able to: Describe the role of an ethical hacker Explain the TCP/IP concepts Describe the types of network attacks Identify physical security attacks and vulnerabilities Use Web tools for footprinting Identify the types of social engineering Describe port scanning and types of port scans Describe the enumeration step of security testing Enumerate OS targets Describe vulnerabilities of the Windows and Linux operating systems Explain techniques to harden systems against Windows and Linux vulnerabilities Describe Web application vulnerabilities and the tools used to attack Web servers Describe wireless networking standards Describe the process of authentication Describe wardriving Describe wireless hacking and tools used by hackers and security professionals Summarize the history and principles of cryptography Describe symmetric and asymmetric encryption algorithms Explain public key infrastructure (PKI) Describe possible attacks on cryptosystems Explain how routers are used as network protection systems Describe firewall technology and tools for configuring firewalls and routers Describe intrusion detection and prevention systems and Web-filtering technology Explain the purpose of honeypots Attendance Requirements: Attendance and oral participation are mandatory. All absences must be explained to the instructor, who will determine whether to omitted work may be made up. All Wayland students are expected to attend every class meeting; the minimum percentage of class participation required to avoid receiving a grade of “F” in the class is 75%. Students who miss the first two class meetings without providing a written explanation to the instructor will be automatically dropped from the roster as a “no-show.” Students who know in advance that they will be absent the first two class meetings and who wish to remain in the class must inform the instructor in order to discuss possible arrangements for making up absences. Statement on Plagiarism and Academic Dishonesty: Wayland Baptist University observes a zero tolerance policy regarding academic dishonesty. Per university policy as described in the academic catalog, all cases of academic dishonesty will be reported and second offenses will result in suspension from the university. Disability Statement: “In compliance with the Americans with Disabilities Act of 1990 (ADA), it is the policy of Wayland Baptist University that no otherwise qualified person with a disability be excluded from participation in, be denied the benefits of, or be subject to discrimination under any educational program or activity in the university. The Coordinator of Counseling Services serves as the coordinator of students with a disability and should be contacted concerning accommodation requests at (806) 291-3765. Documentation of a disability must accompany any request for accommodations.” Course Requirements: Students shall have protection through orderly procedures against prejudices or capricious academic evaluation. A student who believes that he or she has not been held to realistic academic standards, just evaluation procedures, or appropriate grading, may appeal the final grade given in the course by using the student grade appeal process described in the Academic Catalog. Appeals may not be made for advanced placement examinations or course bypass examinations. Appeals are limited to the final course grade, which may be upheld, raised, or lowered at any stage of the appeal process. Any recommendation to lower a course grade must be submitted through the Executive Vice President/Provost to the Faculty Assembly Grade Appeals Committee for review and approval. The Faculty Assembly Grade Appeals Committee may instruct that the course grade be upheld, raised, or lowered to a more proper evaluation. When a student reaches that number of absences considered by the instructor to be excessive, the instructor will so advise the student and file an unsatisfactory progress report with the campus dean. Any student who misses 25 percent or more of the regularly scheduled class meetings will receive a grade of F in the course. You will be expected to keep up, or ahead, of the class schedule and assignments. Come prepared for quizzes, exams and discussion of assignments for every class. It is YOUR RESPONSIBILITY to inform me in advance of any problems, so that an alternative might be worked out. You will only be allowed to make up work early if it is pre-approved with the instructor. If you have special learning needs please let me know ahead of time. It is the University’s policy that no otherwise qualified person experiencing disabilities be excluded from participation in, be denied the benefits of, or be subject to discrimination under and educational program or activity in this University. If a student has an impairment that would require additional accommodations by the instructor and/or theUniversity, then please inform the instructor, or Center Director, beginning of the first class session. GRADING FINAL 200 PTS A=600-540 Quiz’s 120 PTS B=539-480 LABS 110 PTS C=479-420 PROJECT Homework 100 PTS 70 PTS D= 419-360 F= Below360 Tentative Schedule: CLASS DATE Week 25 February 16 3 March 16 10 March 16 READING Chapter Chap 1 Chap 2 Chap 3-4 TOPIC ASSIGNMENT Topics Security 101 Basic Networking Security Essentials Introduction to Ethical Hacking Hacking Terminology The Ethical Hacker Vulnerability Research Footprinting Passive Footprinting Active Footprinting DNS Footprinting Determining Network Range Google Hacking Footprinting Tools Scanning Fundamentals Scanning Methodology The TCP Handshake Identifying Targets Port Scanning Enumeration Windows System Basics Enumeration Techniques Passive and Active Sniffing Sniffing Tools and Techniques Homework handout provided in class. Chap 1 Homework handout provided in class. Chap 2 Quiz Chapter 1 Homework handout provided in class. Chap 3/4 Quiz Chapter 2 17 March 16 24 March 16 31 March 16 Wireshark Other Tools Evasion IDS Firewalls Spring Break Chap 5 Chap 6 Windows Security Architecture Linux Security Architecture Cracking Passwords Password 101 Password Attacks Privilege Escalation and Executing Applications Privilege Escalation Executing Applications Stealth Hiding Files and Activity Covering Your Tracks Attacking Web Servers Web Server Architecture Attack Methodology Web Server Attacks Attacking Web Applications Web Application Architecture Application Attacks SQL Injection Homework handout provided in class. Chap 5 Quiz Chapter 3/4 Homework handout provided in class. Chap 6 Quiz Chapter 5 7 April 16 14 April 16 21 April 16 28 April 16 Chap 7 Chap 8 Chap 9 Chap 10 Wireless Architecture and Standards Finding and Identifying Wireless Networks Wireless Hacking Wireless Attacks Mobile Platform Attacks The “Malware” Attacks Trojans, Backdoors, Viruses, and Worms Remaining Attacks Denial of Service Session Hijacking Encryption Algorithms and Techniques PKI, the Digital Certificate, and Digital Signatures The PKI System Digital Certificates Digital Signatures Encrypted Communication and Cryptography Attacks Data Encryption: At Rest and While Communicating Cryptography Attacks Social Engineering Human-Based Attacks Computer-Based Attacks Mobile-Based Attacks Homework handout provided in class. Chap 7 Quiz Chapter 6 Homework handout provided in class. Chap 8 Quiz Chapter 7 Homework handout provided in class. Chap 9 Quiz Chapter 8 Homework handout provided in class. Chap 10 Quiz Chapter 9 5 May 16 12 May 16 Chap 11 Physical Security Physical Security 101 The Security Assessments Security Assessment Deliverables Miscellaneous Information Guidelines More Terminology Final Exam Chap 1 -11 Homework handout provided in class. Chap 11 Quiz Chapter 10