2022-2023 College Catalog [ARCHIVED CATALOG]
|
CIS 248 - Ethical Hacking II 4 Credits, 5 Contact Hours 3 lecture periods 2 lab periods
Knowledge and skills required to enter the field of professional penetration testing by understanding and applying the attacks, techniques, and tools used by adversaries.
Prerequisite(s): CIS 119 , CIS 188 , and CIS 247 Recommendation: Completion of CIS 221 before enrolling in this course. If any recommended course is taken, see a financial aid or Veteran’s Affairs advisor to determine funding eligibility as appropriate. This course requires a solid knowledge of networking, administration of Linux and Windows, and basic scripting. Information: Prerequisite may be waived, due to comparable industry experience, with consent of the Program Director.

Course Learning Outcomes
- Analyze security weaknesses in IT systems.
- Design an IT security penetration testing plan.
- Conduct successful penetration tests using common tools.
- Create comprehensive penetration test reports.
Outline: I. Overview of Kali Linux
II. Bash Scripting
III. Common Tools
IV. Recon
A. Passive
B. Active
V. Vulnerability Scanning
VI. Attacks
A. Web Application
B. Buffer Overflows
VII. Attacking the Client
A. Windows
B. Microsoft Office
C. Memory corruption
D. AV evasion
VIII. Privilege Escalation
IX. Password Attacks
X. Active Directory Attacks
XI. Post Exploitation
XII. Attack toolkits
A. Metasploit
B. PowerShell Empire
|