2025-2026 Workforce Education Catalog
|
UCIS 248 - Ethical Hacking II Knowledge and skills required to enter the field of professional penetration testing by understanding and applying the attacks, techniques, and tools used by adversaries.
Prerequisite(s): CIS 119, CIS 188, UCIS 247
Recommendation: Completion of CIS 221 before enrolling in this course. This course requires a solid knowledge of networking, administration of Linux and Windows, and basic scripting.
Information: Prerequisite may be waived, due to comparable industry experience, with consent of the Program Director.
.png)
Course Learning Outcomes:
- Analyze security weaknesses in IT systems.
- Design an IT security penetration testing plan.
- Conduct successful penetration tests against an Active Directory environment.
- Create comprehensive penetration test reports.
Outline:
- Review of Kali Linux
- Bash and Powershell Scripting
- Common Tools
- Recon
- Passive
- Active
- Vulnerability Scanning
- Attacks
- Web Application
- Buffer Overflows
- Attacking the Client
- Windows
- Microsoft Office
- Memory corruption
- AV evasion
- Privilege Escalation
- Password Attacks
- Active Directory Attacks
- Post Exploitation
- Attack toolkits
- Metasploit
- PowerShell Empire
|