May 14, 2025  
2025-2026 Workforce Education Catalog 
    
2025-2026 Workforce Education Catalog

UCIS 248 - Ethical Hacking II


Knowledge and skills required to enter the field of professional penetration testing by understanding and applying the attacks, techniques, and tools used by adversaries.

Prerequisite(s): CIS 119, CIS 188, UCIS 247

Recommendation: Completion of CIS 221 before enrolling in this course. This course requires a solid knowledge of networking, administration of Linux and Windows, and basic scripting.

Information: Prerequisite may be waived, due to comparable industry experience, with consent of the Program Director.

 

  button image Prior Learning and link to PLA webpage



Course Learning Outcomes:
  1. Analyze security weaknesses in IT systems.
  2. Design an IT security penetration testing plan.
  3. Conduct successful penetration tests against an Active Directory environment.
  4. Create comprehensive penetration test reports.

Outline:
  1.  Review of  Kali Linux
  2. Bash and Powershell Scripting
  3. Common Tools
  4. Recon
    1. Passive
    2. Active
  5. Vulnerability Scanning
  6. Attacks
    1. Web Application 
    2. Buffer Overflows
  7. Attacking the Client
    1. Windows
    2. Microsoft Office
    3. Memory corruption
    4. AV evasion
  8. Privilege Escalation
  9. Password Attacks
  10. Active Directory Attacks
  11. Post Exploitation
  12. Attack toolkits
    1. Metasploit
    2. PowerShell Empire