2025-2026 Workforce Education Catalog
|
UCIS 248 - Ethical Hacking II 62.5 Noncredit Contact Hours 37.5 Lecture Hours 25 Lab Hours
Knowledge and skills required to enter the field of professional penetration testing by understanding and applying the attacks, techniques, and tools used by adversaries.
Prerequisite(s): CIS 119, CIS 188, UCIS 247
Recommendation: Completion of CIS 221 before enrolling in this course. This course requires a solid knowledge of networking, administration of Linux and Windows, and basic scripting.
Information: Prerequisite may be waived, due to comparable industry experience, with consent of the Program Director.
Course Learning Outcomes:
- Analyze security weaknesses in IT systems.
- Design an IT security penetration testing plan.
- Conduct successful penetration tests against an Active Directory environment.
- Create comprehensive penetration test reports.
Outline:
- Review of Kali Linux
- Bash and Powershell Scripting
- Common Tools
- Recon
- Passive
- Active
- Vulnerability Scanning
- Attacks
- Web Application
- Buffer Overflows
- Attacking the Client
- Windows
- Microsoft Office
- Memory corruption
- AV evasion
- Privilege Escalation
- Password Attacks
- Active Directory Attacks
- Post Exploitation
- Attack toolkits
- Metasploit
- PowerShell Empire
|