SUMMARY OF INFORMATION ON EACH COURSE

Similar documents
SUMMARY OF INFORMATION ON EACH COURSE

Elective for B.IT Security Technology. Anang Hudaya Nazrul Muhaimin Semester and Year offered Trimester 1, Year 3

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

SUMMARY OF INFORMATION ON EACH COURSE/MODULE

e-code Academy Information Security Diploma Training Discerption

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

F21CN: Computer Network Security: Overview

Network Security Course Specifications

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline

Information Security Attack Tree Modeling for Enhancing Student Learning

IT and Cyber Security Training Courses

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

CHIPOLA COLLEGE COURSE SYLLABUS Chipola s website:

Principles of Information Assurance Syllabus

CNA 432/532 OSI Layers Security

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

CS Ethical Hacking Spring 2016

GUJARAT TECHNOLOGICAL UNIVERSITY, AHMEDABAD, GUJARAT COURSE CURRICULUM COURSE TITLE: ESSENTIALS OF NETWORK SECURITY (COURSE CODE: )

Information Security Course Specifications

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

CRYPTUS DIPLOMA IN IT SECURITY

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

User Security Education and System Hardening

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Virtual Learning Tools in Cyber Security Education

CEH Version8 Course Outline

Security + Certification (ITSY 1076) Syllabus

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

[CEH]: Ethical Hacking and Countermeasures

CIS 4204 Ethical Hacking Fall, 2014

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

CYBERTRON NETWORK SOLUTIONS

EC-Council. Certified Ethical Hacker. Program Brochure

EC Council Certified Ethical Hacker V8

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Build Your Own Security Lab

90% of data breaches are caused by software vulnerabilities.

Footprinting and Reconnaissance Tools

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Open Source Security Tools for Information Technology Professionals

Data Encryption and Network Security

3 Mode of delivery Intramural, distance, blended

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

A TOP-RATED UNIVERSITY FOR EMPLOYABILITY. MSc Information and Network Security. T:

Weighted Total Mark. Weighted Exam Mark

Information Security Services

Monfort College of Business Semester Course Syllabus ( ) COURSE PREFIX/TITLE: BACS 382 TCP/IP Network Security Sem. Hrs. 3 Ed.

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Testing Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours

Fundamentals of Network Security - Theory and Practice-

UVic Department of Electrical and Computer Engineering

Network Security Administrator

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

See Course and Program Development Policy and Procedures ( for instructions. o PROGRAM ACTIONS. Original Program Title:

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

Learn Ethical Hacking, Become a Pentester

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Cyber Defense Operations Graduate Certificate

Tools. Tools. Computer Security. Resources. Use a Powerful Editor to be Able to Look at Lots of Different File Formats

Computer Security SEGC-00 - Overview

Bellevue University Cybersecurity Programs & Courses

CERTIFICATE COURSE 1 ST YEAR onwards ADD ON COURSE. Computer Hardware Networking and Ethical Hacking. Semester I

CTN281 - Security+ Certification Prep

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Security Testing in Critical Systems

Curran, K. Tutorials. Independent study (including assessment) N/A

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Computer Science 3CN3 Computer Networks and Security. Software Engineering 4C03 Computer Networks and Computer Security. Winter 2008 Course Outline

NETWORK SECURITY (W/LAB) Course Syllabus

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 275 UNIX and Linux Security Management

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

30 Independent Study. 60 (e.g. lectures, seminars and supervised group activity)

PCCC PCCC Course Description

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

ASK PC Certified Information Systems Security Expert - CISSE

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

LINUX / INFORMATION SECURITY

IT3503 Web Development Techniques (Optional)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Network Access Security. Lesson 10

Medical Device Security Health Group Digital Output

Transcription:

1. Name of Course Ethical Hacking and Security Assessment 2. Course Code TEH 3221 3. Status of Course [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level 3 Diploma MQF Level 4 Bachelor MQF Level 6 Masters MQF Level 7 Doctoral MQF Level 8 5. Version (State the date of the Senate approval history of previous and current approval date) Specialisation Core for B.IT (Hons) Security Technology Bachelor Degree MQF Level 6 Date of previous version : June 2012 Date of current version : June 2014 6. Pre-Requisite TDC1231 Data Communications and Networking 7. Name(s) of academic/teaching staff Ooi Shih Yin 8. Semester and Year offered Trimester 2, Year 3 9. Objective of the course in the programme : To help the students master an ethical hacking methodology that can be used in a penetration testing or ethical hacking. 10. Justification for including the course in the programme : This course prepares the students with the knowledge on ethical hacking methodology, common practices and techniques used by computer hackers, and security assessment procedures. After learning this course, students shall be able to evaluate, select and design the best security systems for their computer and network. 11. Course Learning Outcomes : Domain Level LO1 Apply and discover the hacking techniques and prevention techniques. Cognitive 3 Analyse and identify the vulnerabilities of the system and LO2 the network. Cognitive 4 LO3 Plan and design the countermeasures. Cognitive 5 LO4 Evaluate the security of the system and the network. Cognitive 6 12. Mapping of Learning Outcomes to Programme Outcomes : Ver.1, Rev.2 Page1 of 5

Learning Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 LO1 X X X LO2 X X X LO3 X X X X LO4 X X X X 13. Assessment Methods and Types : Method and Type Description/Details Percentage Mid Test Written Test 10% Laboratory Practical Work and Report 20% Quiz Written Quiz 10% Final Exam Written Exam 60% 14. Mapping of assessment components to learning outcomes (LOs) Assessment Components LO1 LO2 LO3 LO4 Mid Test 10 12.5 12.5 Laboratory 100 20 Quiz 10 12.5 12.5 Final Exam 60 75 75 15. Details of Course Topics 1. Ethical Hacking Overview Introduction to Ethical Hacking. The Role of Security and Penetration Tester. Penetration-Testing Methodologies. Certification Programs for Network Security Personnel. Laws of the Land. Recent Hacking Cases. Federal Laws. Anti-Spam Vigilantes. Mode of Delivery (eg : Lecture, Tutorial, Workshop, Seminar, etc.) Indicate allocation of SLT (lecture, tutorial, lab) for each subtopic Lecture Lab 2. TCP/IP Concepts Review Overview of TCP/IP. Four Different Layers of TCP/IP Protocol Stack. Basic Concepts of IP Addressing. Binary, Octal, and Hexadecimal Numbering System. 3. Network and Computer Attacks Different Types of Malicious Software. Methods of Protecting Against Malware Attacks. Types of Network Attacks. Physical Security Attacks and Vulnerabilities. Ver.1, Rev.2 Page2 of 5

4. Footprinting and Social Engineering Web Tools for Footprinting. Competitive Intelligence. DNS Zone Transfers. Types of Social Engineering. 5. Port Scanning Port Scanning Overview. Different Types of Port Scans. Port-Scanning Tools. To Conduct Ping Sweeps. Shell Scripting. 6. Enumeration Enumeration Step of Security Testing. Enumerate Microsoft OS Targets. Enumerate NetWare OS Targets. Enumerate *NIX OS Targets. 7. Programming for Security Professionals Basic Programming Concepts. Simple C Program. Create Web Pages with HTML. Basic Perl Programs. Basic Object-Oriented Programming Concepts. 8. Desktop and Server OS Vulnerabilities Describe the Vulnerabilities of Windows and Linux Operating Systems. Identify Specific Vulnerabilities and Explain Ways to Fix Them. Techniques to Harden Systems Against Windows and Linux Vulnerabilities. 9. Embedded Operating Systems: The Hidden Threat Embedded Operating Systems Overview. Windows and Other Embedded Operating Systems. Vulnerabilities of Embedded Operating Systems and Best Practices for Protecting Them. 10. Hacking Web Servers Web Applications. Web Application Vulnerabilities. The Tools Used to Attack Web Servers. 11. Hacking Wireless Networks Wireless Technology. Wireless Networking Standards. Process of Authentication. Wardriving. Wireless Hacking and Tools Used by Hackers and Security Professionals. 12. Cryptography Overview of Cryptography. Symmetric and Asymmetric Cryptography Algorithms. Public Key Infrastructure (PKI). Possible Attacks on Cryptosystems. 13. Network Protection Systems Network Security Devices. Firewall Technology. Intrusion Detection Systems. Honeypots. Total 26 26 15. Total Student Learning Time (SLT) Face to Face / Guided Learning Independent Learning Lecture 26 26 Ver.1, Rev.2 Page3 of 5

Tutorials 0 0 Laboratory/Practical 26 13 Presentation 0 0 Assignment 0 0 Mid Term Test 1 5 Final Exam 2 17 Quizzes 4 times 4 Sub Total 55 65 Total SLT 120 Credit Value 120/40 = 3 16. Reading Materials : Textbooks 1. Michael T. Simpson, Kent Backman, James E.Corley, (2012). Hands-On Ethical Hacking and Network Defense, Cengage Learning. ISBN-13: 978-1-1339-3561-2 Reference Material (including Statutes for Law) 1. Ed Skoudis with Tom Liston, (2007). Counter Hack Reloaded, 2 nd Ed. Prentice Hall. ISBN: 0-13- 148104-5 2. Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan Eren, Neel Mehta, Riley Hassell, (2004). The Shellcoder s Handbook, Wiley Publishing. ISBN: 0-7645-4468-3 Appendix (to be compiled when submitting the complete syllabus for the programme) : 1. Mission and Vision of the University and Faculty 2. Programme Objectives or Programme Educational Objectives 3. Programme Outcomes (POs) 4. Mapping of POs to the 8 MQF domain 5. Summary of the Bloom s Taxonomy s Domain Coverage in all the Los in the format below : Learning Outcomes Bloom s Taxonomy Domain Subject (please state the Affective Cognitive Psychomotor learning 0utcomes) ABC1234 Learning Outcome 1 Learning Outcome 2 Learning Outcome 3 Learning Outcome 4 DEF5678 Learning Outcome 1 Learning Outcome 2 Learning Outcome 3 Ver.1, Rev.2 Page4 of 5

Learning Outcome 4 6. Summary of LO to PO measurement 7. Measurement and Tabulation of result for LO achievement 8. Measurement Tabulation of result for PO achievement Ver.1, Rev.2 Page5 of 5