Dec 26, 2024  
2023-2024 College Catalog 
    
2023-2024 College Catalog [ARCHIVED CATALOG]

CIS 248 - Ethical Hacking II

4 Credits, 5 Contact Hours
3 lecture periods 2 lab periods

Knowledge and skills required to enter the field of professional penetration testing by understanding and applying the attacks, techniques, and tools used by adversaries.

Prerequisite(s): CIS 188 , and CIS 247  
Recommendation: Completion of CIS 221   before enrolling in this course. If any recommended course is taken, see a financial aid or Veteran’s Affairs advisor to determine funding eligibility as appropriate. This course requires a solid knowledge of networking, administration of Linux and Windows, and basic scripting.
Information: Prerequisite may be waived, due to comparable industry experience, with consent of the Program Director.
Button linking to AZ Transfer course equivalency guide  

Course Learning Outcomes
  1. Analyze security weaknesses in IT systems.
  2. Design an IT security penetration testing plan.
  3. Conduct successful penetration tests against an Active Directory environment.
  4. Create comprehensive penetration test reports.

Outline:
  1.  Review of  Kali Linux
  2. Bash and Powershell Scripting
  3. Common Tools
  4. Recon
    1. Passive
    2. Active
  5. Vulnerability Scanning
  6. Attacks
    1. Web Application 
    2. Buffer Overflows
  7. Attacking the Client
    1. Windows
    2. Microsoft Office
    3. Memory corruption
    4. AV evasion
  8. Privilege Escalation
  9. Password Attacks
  10. Active Directory Attacks
  11. Post Exploitation
  12. Attack toolkits
    1. Metasploit
    2. PowerShell Empire


Effective Term:
Fall 2023