Ethical Hacking – CSCI 632
CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020
This course goes into the how and why of ethical hacking, and how it is used to strengthen security of systems, including issues in penetration testing, such as physical security and social engineering.
The Ethical Hacking course introduces the student to the methods and techniques used by computer hackers and penetration testers from a real-world perspective. The objective of this course is to provide the student with an understanding of offensive security, with an emphasis on practical exposure to hacking via hands-on assignments, in order to prepare him/her to better defend against cyber attacks in live systems.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Know the ethical issues regarding professional ethical hacking and penetration testing.
- Use the tools available for crafting exploits.
- Understand the basic techniques for gaining unauthorized access into a large network and computer system, using both technical and non-technical means.
- Be able to assess potential vulnerabilities in a network security system within executable programs or within network protocols.
- Intregrate biblical principles within the field of computer security.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.
Discussion Board Forums (3)
Discussion boards are a collaborative learning experience. Therefore, the student is required to create an thread in response to the provided topic for each forum. Each thread must be 500 words and demonstrate course-related knowledge. The student must integrate relevant biblical principles into the thread. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be 250 words.
The student will complete labs associated with the course material. Each lab will have specific instructions for tasks, along with deliverables, to be completed in the virtual lab environment.
The student will complete 2 projects using the provided Vulnerability Assessment Report and Penetration Test Report templates. The content for the report will be gathered from the completed Labs. Each project must include at least 2 references in addition to the class textbook.
Each quiz will cover the Reading & Study material for the modules/weeks in which it is assigned and will include questions that may require independent research. Each quiz will be open-book/open-notes, contain 5 multiple-choice questions, and have a 1-hour time limit.