CS 391-950 Ethical Hacking Spring 2016



Similar documents
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

[CEH]: Ethical Hacking and Countermeasures

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC Council Certified Ethical Hacker V8

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Certified Ethical Hacker (CEH)

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

EC-Council. Certified Ethical Hacker. Program Brochure

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

EC-Council. Program Brochure. EC-Council. Page 1

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Applied Network Security Course Syllabus Spring 2015

CS 464/564 Networked Systems Security SYLLABUS

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

ITS425: Ethical Hacking and Penetration Testing

LINUX / INFORMATION SECURITY

How To Pass A Network Security Course Online At Sp College

MW , TU 1-3; and other times by appointment

Network Security ITP 457 (4 Units)

CIS 4204 Ethical Hacking Fall, 2014

CEH Version8 Course Outline

ITS425: Ethical Hacking and Penetration Testing

CS 340 Cyber Security Weisberg Division of Computer Science College of Information Technology & Engineering Marshall University

St Petersburg College CTS1120 Online. Intro Network Security Foundations - (8 weeks online) Course Syllabus

I. PREREQUISITES For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:

CIS 213 PENETRATION TESTING 3 cr. (2-2)

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Contact Information I usually try to check once per day and respond within 48 hours or sooner, except on weekends and holidays.

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

CS 450/650 Fundamentals of Integrated Computer Security

Footprinting and Reconnaissance Tools

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Penetration Testing Service. By Comsec Information Security Consulting

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

CYBERTRON NETWORK SOLUTIONS

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

WAYLAND BAPTIST UNIVERSITY VIRTUAL CAMPUS SCHOOL OF BUSINESS SYLLABUS

This four (4) credit hour. Students will explore tools and techniques used penetrate, exploit and infiltrate data from computers and networks.

Hackers are here. Where are you?

CS4320 Computer and Network Security. Fall 2015 Syllabus

UVic Department of Electrical and Computer Engineering

CRYPTUS DIPLOMA IN IT SECURITY

IST359 - INTRODUCTION TO DATABASE MANAGEMENT SYSTEMS

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Del Mar College Course Syllabus. CDEC 1313 Curriculum Resources for Early Childhood (online)

Math 103, College Algebra Spring 2016 Syllabus MWF Day Classes MWTh Day Classes

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

CSC 474 Information Systems Security

PSY 2012 General Psychology Sections 4041 and 1H85

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

KIN 104 FITNESS AND WELLNESS ONLINE LECTURE Summer 2016

Course title: Management Information Systems Fall 2010 Course number: CRN: Location: Meeting day: Meeting time:

CNA 432/532 OSI Layers Security

Precalculus Algebra Online Course Syllabus

CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science (RVR 3018; /6834)

CS135 Computer Science I Spring 2015

COURSE SYLLABUS FIREWALLS & NETWORK SECURITY. ITSY-2301 Number Lecture - Lab - Credit. ITSY-1342 Prerequisites. April 16, 2015 Revision Date

Introduction to Computer Forensics Course Syllabus Spring 2012

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

MKTG 435 International Marketing Course Syllabus Spring Phone: (618)

PHOENIX COLLEGE ONLINE. SBS220 Internet Marketing for Small Business

Principles of Information Assurance Syllabus

CHEM PRINCIPLES OF CHEMISTRY Lecture

DSCI 3710 Syllabus: Spring 2015

CSci 4211: Data Communications and Computer Networks. Time: Tuesday and Thursday 8:15 to 9:30 am Location: Phyics 170 Spring 2015, 3 Credits

Engineering for Sustainability ENCE 215. Syllabus Summer 2015

WILLIAM PATERSON UNIVERSITY CHRISTOS M. COTSAKOS COLLEGE OF BUSINESS Course Syllabus

SAMPLE SUBJECT TO CHANGE University of Toledo Department of Criminal Justice CRIM 1010 Criminal Justice (3 credits) Section 901 Fall Semester, 2014

Strategic Use of Information Technology (CIS ) Summer /

Syllabus. No: CIS 200. Title: Fundamentals of Network Security. Credits: 4. Coordinator: Dr. B. Dike-Anyiam, Computer Science & Networking Lecturer

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Psychology 420 (Sections 101 and 102) Experimental Psychology: Social Psychology Laboratory

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

e-code Academy Information Security Diploma Training Discerption

Psychological Testing (PSYCH 149) Syllabus

How To Pass A Customer Service Course At Tstc

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

EC-Council Certified Security Analyst (ECSA)

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Intermediate Economics II: Macroeconomics Economics 512: ONLINE Spring 2015

Marshall University Syllabus

Transcription:

CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: nick@cs.siu.edu Course Web Site: https://online.siu.edu/ Final Exam: Monday, May 9 through Thursday, May 12 Email is the best way to contact me. I usually respond to emails within 24 hours during the week and 48 hours on weekends. Required Textbook Certified Ethical Hacker (CEH) Cert Guide Network Defense, Michael Gregg. Pearson IT Certification. ISBN-10: 0789751275 ISBN-13: 9780789751270 Course Description This course will explore the various means that an intruder has available to gain access to computer resources. We will investigate weaknesses by discussing the theoretical background, and whenever possible, actually performing the attack. We will then discuss methods to prevent/reduce the vulnerabilities. This course is targeted specifically for Certified Ethical Hacking (CEH) exam candidates, matching the CEH exam objectives with the effective and popular Cert Guide method of study. Prerequisite: CS 202 or equivalent Course Objectives Upon successful completion of the course, the student should be able to: 1. Analyze security vulnerabilities of a network and develop a set of solutions for specific networking scenarios. 1

2. Identify security tools including, but not limited to intrusion detection and firewall software. 3. Exhibit an understanding of the threats posed by viruses to networks through the development of appropriate protection plans. 4. Find and utilize available online resources as they pertain to developing a secure system. 5. Develop comprehensive plans for network security using a full range of available tools. 6. Prepare students for Ethical Hacking Certification (CEH) exam. Specific topic coverage includes: Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux distros and automated assessment tool Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Physical security and social engineering Assignment and Examination Overview Readings Assignments: Each week, one or two chapters are assigned for reading. You must read the assigned chapters from the textbook first then read the slides to clarify and support concepts encountered. Lab Assignments: For each chapter there is a lab assignment, hands-on activity that reinforces knowledge you learned from the associated chapter. For most of the labs, students utilize virtual networking lab environment that can be accessed over the internet. These lab assignments are always due on Sunday nights by midnight. All lab assignments must be completed at 100% accuracy to receive full credit. Late lab assignments will not be accepted. Discussions: Each chapter requires a discussion posts and responses. Weekly discussion leaders are assigned to facilitate the discussion and provide an assessment of participation. The discussion format is as follows: Analyze, Synthesize, and Apply what you learned. Write a paragraph or two about what the topic was about (analyze), what you learned from the reading and your results 2

(synthesize), and point out how some of this information might play out in the real world (apply) such as a fact or two that surprised you and how others might not know the same information. Post three questions that concern you about the topic. Quizzes: There are going to be six (6) quizzes. The quizzes will be timed, so you should study beforehand because it will be difficult to finish in time if you are frantically flipping through your book for the answers. Quizzes will come straight out of the reading assignments. There are no quiz make-ups without appropriate written proof. Exam: There will be two exams. Discussion Facilitators The role of the discussion facilitator is to lead the discussion and provide an assessment of an assigned group of individuals as well as their own personal performance. The role of the discussion leaders is as follows: 1. While not required to start the discussion, post personal ASA early in the week. 2. Encourage late posters to engage in the discussion. 3. Keep track of postings and apply the following points: Your personal posting should typically: Discussion Points Breakdown Point Value Analyze the weekly information (5pts)- What areas did the work cover (major points)? Synthesize the weekly information (5pts)- How and why is this important? What did you learn from the reading? Apply the weekly information (5pts)- How do you see this information playing out in the real world? Post three questions (5pts) 20 points Respond to a classmate's posed question. Total 5 points 25 points 4. Confidentially submit points (including personal) for each individual to instructor by emailing them with Discussion Points and the activity title in the subject line. This submission shall also include support for the total submitted. Submissions should look similar to the following: 3

Jon Doe - 20 Points 5pts Analyze - provided a great overview of chapter 2pts Synthesize - didn't indicate why xyz is important 5pts Apply - knew how the topic played out in the world 5pts Three questions were posted 3pts Question One - weak on the answer 5. NOTE*** If discussion leader does not submit points by deadline (announce later), they will forfeit all of their own points for that week. Points submitted by the discussion leader are used to influence points provided by instructor. The instructor will have the last call on points given. Online Participation You are expected to regularly review the content of the course D2L website, read the assigned texts and participate in the discussions and other course activities each week. Assignments should be posted by the due dates. If an emergency arises that prevents you from participating in class, please let your instructor know as soon as possible. Attendance Policy Attendance will be counted as visiting the course D2L page, participating in the discussions and having posted an assignment during that week of the session. A class week is defined as the period of time between Monday and Sunday. The course and system deadlines are all based on the Central Time Zone. Email Communication You are responsible for monitoring emails from the instructor (nick@cs.siu.edu). I expect that you check your emails (the email account registered under your Salukinet account) multiple times daily for important messages from the department or your instructor. Grading and Evaluation Criteria Your grade will be determined by the percentage of the total points you get. The components of the course grade are: Lab Assignments 25% Discussions 20% Quizzes 15% Two Exams 40% Total 100% 4

Timeliness of Assignments It is expected that students submit all courses assignments in a timely manner. Specifically: Deliverables (assignments, quizzes, discussion posts, and exam) must be submitted on or before the due date. NO EXCEPTIONS! Late Assignment submissions will not be accepted. Discussions will lock on Sunday night and there is no opportunity to make up missed discussions. Exam and quizzes must be completed within the window provided. No makeup opportunities Letter Grading Policy A 90 % and above B 80-89 % C 70-79 % D 60-69 % F Below 60 % 5

Tentative Course Outline Week Chapter Readings Assignment/ Discussion Quiz Exams Chapter 1 Student Agreement/ 1 Introduction/ Discussion1 2 Chapter 2 Lab1&2 / Discussion2 Quiz1 3 Chapter 3 Lab3/Discussion3 4 Chapter 4 Lab4/ Discussion4 Quiz2 5 Chapter 5 Lab5/Discussion5 6 Chapter 6 Lab6/ Discussion6 Quiz3 7 Review &Practice Midterm Exam 8 Spring Vacation 9 Chapter 7 Lab7/ Discussion7 10 Chapter 8 Lab8/ Discussion8 Quiz4 11 Chapter 9 Lab9/Discussion9 12 Chapter 10 Lab10/ Discussion10 Quiz5 13 Chapter 11 Lab11/Discussion11 14 Chapter 12 Lab12/ Discussion12 Quiz6 15 Chapter13 Lab13/ Discussion13 16 Chapter 14 Discussion14 17 Final Exam 6

Retype or copy and paste the following statement into the D2L Drop Box to acknowledge the fact that you have read and understand the syllabus. Fill in the blanks where appropriate. Student Agreement CS 391-950 Ethical Hacking Spring 2016 Nick Rahimi I have received and read the syllabus for the course, and I agree to enroll in the course under those terms. I understand that the skills I learn here can be dangerous if used improperly, and I agree to use them only in ethical ways. I understand that unauthorized hacking is a crime and could get me into serious legal trouble which neither my instructor nor the department will be able to save me from. Name: Email: Dawg Tag: Semester: Date: 7