CIS 284EH Ethical Hacking

Introduces network penetration testing methodologies used to help businesses discover and mitigate security weaknesses, using the Linux and Windows operating systems. Includes security related topics such as: firewalls, intrusion detection systems, vulnerability scanners, packet sniffing, port scanning, cryptography, log analysis, web application attacks, exploitation tools, scripting languages, the Metasploit framework, VPNs, port redirection, security policies, compliance regulations, and professional codes of conduct.

Credits

4

Prerequisite

CIS 152 Routing, Switching, and Wireless Essentials with a grade of C or better.

Outcomes

Upon successful completion of this course, students will be able to:
Use a packet sniffer to identify network information. Execute a network port scan and identify potential network vulnerabilities. Execute a vulnerability scan to create a vulnerability assessment. Analyze traffic/firewall logs using an intrusion detection system and firewall. Execute a variety of web application attacks including SQL injection, cross site scripting, as well as dictionary and brute force password attacks.