ITSY 2330 Intrusion Detection Course Syllabus

Size: px
Start display at page:

Download "ITSY 2330 Intrusion Detection Course Syllabus"

Transcription

1 ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office: Website: Course Level Advanced Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. ITSY 2300 Operating System Security Credit Hours 3.0 (Lecture 2, Lab 4) Course Location/Times JDB 208, HCC Central Campus Monday PM Total Course Contact Hours 96 Instructional Materials Instructional Methods (select one) Hands-On Ethical Hacking And Network Defense, 2nd Edition. Author: Michael T. Simpson. ISBN-10: ; ISBN-13: Publisher: Course Technology Cengage Learning Face to Face Type of Instruction Lecture/Lab, COOP, Practicum, or Lecture Course Length (number of weeks) 16 Weeks Computer Science Technology Department Page 1 of 6

2 Course Requirement, Policy, and Course Calendar Instructor's Requirements Instructor Grading Criteria Access to a PC running Windows XP/Vista/Windows 7/Linux/Unix with internet access. Access to a PC running Linux operating system PC should have access to the SSH shell (download from ce.uml.edu/ssh.htm) Textbook pts each pts 22 Projects pts Final exam pts Total pts A = 90% - 100% B = 80% - 89% C = 70% - 79% D = 60% - 69% F = below 59% Course Calendar Date Quiz Topic 8/29/2011 Ch 1: Ethical Hacking Overview & The Security Circus 9/5/2011 No class Labor Day Holiday 9/12/2011 Ch 2: TCP/IP Concepts Review 9/19/2011 Ch 3: Network and Computer Attacks 9/26/2011 Quiz on Ch 1-3 Project 1-3 due Ch 4: Footprinting and Social Engineering 10/3/2011 Quiz on Ch 4 Ch 5: Port Scanning Proj 4 &5 due 10/10/2011 Quiz on Ch 5 Proj 6 & 7 due Ch 6: Enumeration Computer Science Technology Department Page 2 of 6

3 10/17/2001 Quiz on Ch 6 Proj 8 & 9 due 10/24/2011 Quiz on Ch 7 Proj 10 & 11 due 10/31/2011 Quiz on Ch 8 Proj 12 & 13 due 11/7/2011 Quiz on Ch 9 Proj 14 & 15 due 11/14/2011 Quiz on Ch 10 Proj 16 & 17 due 11/21/2011 Quiz on Ch 11 Proj 18 & 19 due 11/28/2011 Quiz on Ch 12 Proj 20 & 21 due 12/5/2011 Last class meeting Proj 22 due Ch 7: Programming for Security Professionals Ch 8: Desktop and Server OS Vulnerabilites Ch 9: Embedded Operating Systems: The Hidden Threat Ch 10: Hacking Web Servers Ch 11: Hacking Wireless Networks Ch 12: Cryptography Ch 13: Network Protection Systems Topic to be announced 12/12/2011 Final Exam Learning Objective, Students Learning Outcome, and Program Spec Note: This section of the syllabus provides the general course learning objectives, the expected students learning outcome, the course scope in terms of the department program, and the instrument used to evaluate the course. If you have any question, contact the instructor or the department. HCC Grading Scale Grade GPA Points A = points per semester hour B = 89-80: 3 points per semester hour C = 79-70: 2 points per semester hour D = 69-60: 1 points per semester hour 59 and below = F IP (In Progress) W(Withdrawn) I (Incomplete) AUD (Audit) IP (In Progress) is given only in certain developmental courses. The student must re-enroll to receive credit. COM (Completed) is given in non-credit and continuing education courses. To compute grade point average (GPA), divide the total grade points by the total number of semester hours attempted. The grades "IP," "COM" and "I" do not affect GPA. Computer Science Technology Department Page 3 of 6

4 Course Student Learning Outcomes (SLO): Learning Objectives 1. Use appropriate integrated software to solve contemporary real-world problems. 2. Integrate appropriate features from several commonly used application programs to generate a document (or set of documents) that solves a contemporary real-world problem. 3. Use Spreadsheets to create a chart with the statistics you plan to use in your presentation slideshow. 4. Demonstrate proper file management techniques to manipulate files and folders in a networked environment. 5. Apply proper formatting techniques to a document draft so that it models a previously formatted document. 6. Develop an algorithm that solves a problem. 7. Demonstrate the effective use of search engines to find reliable and relevant internet resources. 8. Create data that can be edited and kept current. 9. Demonstrate effective oral presentation skills using a slideshow (created with a presentation graphics program) as a visual aid. Upon successful completion of this course, the student will be able to: A. Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers. B. Define the types of malicious software found in modern networks. C. Explain the threats and countermeasures for physical security and social engineering. D. Perform footprinting to learn about a company and its network. E. Perform port scans to locate potential entry points to servers and networks. F. Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets. G. Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals. H. Learn how to identify Microsoft Windows vulnerabilities and to harden systems. I. Learn how to identify Linux vulnerabilities and to protect servers. J. Describe how to take control of Web Servers, and how to protect them. K. Locate and hack into wireless networks, and protect them. L. Explain how cryptography and hashing work, and perform attacks against them such as password cracking and man-in-the-middle attacks. M. Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots. Student Assignments Student Assessment(s) Refer to the course calendar 1. Use appropriate integrated software to solve contemporary real-world problems. 2. Integrate appropriate features from several commonly used application programs to generate a document (or set of documents) that solves a contemporary realworld problem. 3. Use Spreadsheets to create a chart with the statistics you plan to use in your presentation slideshow. 4. Demonstrate proper file management techniques to manipulate files and folders in Computer Science Technology Department Page 4 of 6

5 a networked environment. 5. Apply proper formatting techniques to a document draft so that it models a previously formatted document. 6. Develop an algorithm that solves a problem. 7. Demonstrate the effective use of search engines to find reliable and relevant internet resources. 8. Create data that can be edited and kept current. 9. Demonstrate effective oral presentation skills using a slideshow (created with a presentation graphics program) as a visual aid. Program/Discipline Requirements: Academic Discipline/CTE Program Learning Outcomes SCANS and/or Core Curriculum Competencies: If applicable Instructors will use syllabus that will satisfy CurricuUNET requirements and improve ongoing assessment of student-centered learning and teaching Develop essential operating systems skills including how to use, setup, configure, troubleshoot and maintain a current microcomputer operating system 2. Use and configure essential office applications and 3. Help other technology users, develop training and maintenance plans and to translate new technical knowledge so that others can use it 4. Install, configure, and administer Linux/UNIX and other systems. 5. Document work log, write clearly and appropriately in an Information Technology context, respect user s data, including backup and security SCANS 1. C1: Allocates Time Students will learn to allocate time to perform each task (online course will emphasize this task more). 2. C5: Acquires and Evaluates Information Student will be able to identify need for data, obtain it from existing sources or create them, and evaluate information. 3. C6: Organizes and Maintains Information Students will learn to organize their assignments and manage to complete them with specific deadline. 4. C18: Selects Technology Students will use flowcharts to understand the subject. Students will select appropriate compiler to run program. 5. C20: Maintains and Troubleshoots Technology Student will be able to prevent, identify or solve problems in machines, computers, and other technologies. 6. F9: Problem Solving Students will learn problem-solving methodology (pseudocode). 7. F10: Seeing Things in the Minds Eye Student will be able to organize and process symbols, pictures, graphs, objects or other information. Every semester, calendar based weekly learning material (reading, hands exercises for inclass, web enhanced, or online assignments, and scheduled quiz/test/exam) will be posted as part of the syllabus. Computer Science Technology Department Page 5 of 6

6 HCC Policy Statement Access Student Services Policies on their Web site: Distance Education and/or Continuing Education Policies Access DE Policies on their Web site: Access CE Policies on their Web site for non-credit classes: Competencies: If applicable Computer Science Technology Department Page 6 of 6

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITSC 1309 Integrated Software Applications I Course Syllabus Instructor Course Reference

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number:713-718-6776 ab Houston Community College ITSW 2334Advanced Spreadsheets Course Syllabus Instructor Course Reference

More information

ITSY Information Technology Security Course Syllabus Spring 2018

ITSY Information Technology Security Course Syllabus Spring 2018 ITSY 1342 - Information Technology Security Course Syllabus Spring 2018 Instructor Course Reference Number (CRN) Course Description: Name: Fidelis Ngang Tel: 713-718-5552 Office: Spring Branch, Room 900L

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 2301 - Windows Server 2008 Network Infrastructure Configuration Administering

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: 713-718-6776 Houston Community College ITMT 2373 - Configuring Advanced Windows Server 2012 Services Course Syllabus

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 1370 Windows Client Operating System - Windows 10 Course Syllabus Summer 2017

More information

Computer Science Technology Houston Community College

Computer Science Technology Houston Community College Computer Science Technology Houston Community College UNIX Operating Systems I Course Syllabus Instructor Course Reference Number (CRN) WECM Course Description: Course Prerequisite(s) Course Semester Credit

More information

ab Houston Community College

ab Houston Community College Computer Science Technology Department ab Houston Community College ITNW 1313 Computer Virtualization Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s)

More information

ITNW 1425 Fundamentals of Networking Technologies Course Syllabus fall 2012

ITNW 1425 Fundamentals of Networking Technologies Course Syllabus fall 2012 ITNW 1425 Fundamentals of Networking Technologies Course Syllabus fall 2012 Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture,

More information

ab Houston Community College

ab Houston Community College Computer Science Technology Department Houston Community College/Northeast Department Phone Number: 713-718-6457 ab Houston Community College ITMT 2351 - Windows Server 2008 Server Administrator Course

More information

Computer Science Technology Houston Community College

Computer Science Technology Houston Community College Computer Science Technology Houston Community College UNIX Operating Systems I Course Syllabus Instructor Course Reference Number (CRN) WECM Course Description: Course Prerequisite(s) Course Semester Credit

More information

Computer Science Technology Department

Computer Science Technology Department Computer Science Technology Department Houston Community College Department Phone Number: 713-718-6776 ab Houston Community College ITSC 1301 Introduction to Computers Course Syllabus summer 2 nd 8 weeks,

More information

Course Syllabus Internal Control And Auditing ACNT 2331

Course Syllabus Internal Control And Auditing ACNT 2331 Semester with Course Reference Number (CRN) Instructor contact information (phone number and email address) Office Location and Hours Course Location/Times Course Semester Credit Hours (SCH) (lecture,

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 3443 Network Security Students will provide Cyber Defense while understanding Cyber Threats. Their attack types

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog. CSCI 632 Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase

More information

Network Security

Network Security 44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM C EH Program Brochure Target Audience This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the

More information

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker Learn to find security vulnerabilities before the bad guys do! The Certified Ethical Hacker (CEH) class immerses students in an interactive environment

More information

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker.  12 May 2018 Course Outline CEH v8 - Certified Ethical Hacker 12 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

CPTE: Certified Penetration Testing Engineer

CPTE: Certified Penetration Testing Engineer www.peaklearningllc.com CPTE: Certified Penetration Testing Engineer (5 Days) *Includes exam voucher, course video, an exam preparation guide About this course Certified Penetration Testing Engineer certification

More information

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431 Cyber Security I - CoSci 411 Los Angeles Mission College - Spring 2018 Instructor: Javier Rios E-mail: rios.javier@gmail.com E-mail communications will be will receive a response within 24 hours. Advisory:

More information

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker.  03 Feb 2018 Course Outline CEH v8 - Certified Ethical Hacker 03 Feb 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

1. Query and manipulate data with Entity Framework.

1. Query and manipulate data with Entity Framework. COLLEGE OF INFORMATION TECHNOLOGY DEPARTMENT OF MULTIMEDIA SCIENCE COURSE SYLLABUS/SPECIFICATION CODE & TITLE: ITMS 434 Developing Windows Azure and Web Services (MCSD 20486) WEIGHT: 2-2-3 PREREQUISITE:

More information

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo ETHICAL HACKING (CEH) CURRICULUM Introduction to Ethical Hacking What is Hacking? Who is a Hacker? Skills of a Hacker? Types of Hackers? What are the Ethics and Legality?? Who are at the risk of Hacking

More information

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker NH9000 Certified Ethical Hacker 104 Total Hours COURSE TITLE: Certified Ethical Hacker COURSE OVERVIEW: This class will immerse the student into an interactive environment where they will be shown how

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

Standard Course Outline IS 656 Information Systems Security and Assurance

Standard Course Outline IS 656 Information Systems Security and Assurance Standard Course Outline IS 656 Information Systems Security and Assurance I. General Information s Course number: IS 656 s Title: Information Systems Security and Assurance s Units: 3 s Prerequisites:

More information

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Certified Ethical Hacker

Certified Ethical Hacker Certified Ethical Hacker Certified Ethical Hacker Course Objective Describe how perimeter defenses function by ethically scanning and attacking networks Conduct information systems security audits by understanding

More information

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

EC-Council - EC-Council Certified Security Analyst (ECSA) v8 EC-Council - EC-Council Certified Security Analyst (ECSA) v8 Code: 3402 Lengt h: URL: 5 days View Online The EC-Council Certified Security Analyst (ECSA) program teaches information security professionals

More information

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Course 831 EC-Council Certified Ethical Hacker v10 (CEH) Duration: 5 days What You Get: CEH v10 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class

More information

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam. Course Outline Matt Walker s All in One Course for the CEH Exam 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) COURSE OVERVIEW: The most effective cybersecurity professionals are able to predict attacks before they happen. Training in Ethical Hacking provides professionals with the

More information

Cyber Security CYBER SECURITY

Cyber Security CYBER SECURITY Cyber Security We live in a digital world. Whether it s keeping in touch with friends, operating a city s energy grid or strengthening national security, it happens online. The need to secure our networks

More information

EC-Council C EH. Certified Ethical Hacker. Program Brochure

EC-Council C EH. Certified Ethical Hacker. Program Brochure EC-Council TM H Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in.

More information

CEH: CERTIFIED ETHICAL HACKER v9

CEH: CERTIFIED ETHICAL HACKER v9 CEH: CERTIFIED ETHICAL HACKER v9 SUMMARY The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever

More information

Course 831 Certified Ethical Hacker v9

Course 831 Certified Ethical Hacker v9 Course 831 Certified Ethical Hacker v9 Duration: 5 days What You Get: CEH v9 Certification exam voucher 5 days of high quality classroom training 18 comprehensive modules 40% of class hours dedicated to

More information

USF Sarasota-Manatee - New Undergraduate Course Proposal Form

USF Sarasota-Manatee - New Undergraduate Course Proposal Form USF Sarasota-Manatee - New Undergraduate Course Proposal Form 1. College/School Contact Information Tracking Number Date & Time Submitted 3 2010-03-29 17:13:37 Discipline College/School Budget Account

More information

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan Course Outline CEH v8 - Certified Ethical Hacker 15 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training

More information

CS 3030 Scripting Languages Syllabus

CS 3030 Scripting Languages Syllabus General Information CS 3030 Scripting Languages Semester: Fall 2017 Textbook: Location: Instructor Info: None. We will use freely available resources from the Internet. Online Ted Cowan tedcowan@weber.edu

More information

CS 3030 Scripting Languages Syllabus

CS 3030 Scripting Languages Syllabus General Information CS 3030 Scripting Languages Semester: Summer 2013 Textbook: Location: Instructor Info: Website: None. We will use freely available resources from the Internet. Online Ted Cowan tedcowan@weber.edu

More information

Hands-On Hacking Course Syllabus

Hands-On Hacking Course Syllabus Hands-On Hacking Course Syllabus Version 0. 1 Hands-On Hacking 1 Table of Contents HANDS-ON HACKING... 1 TABLE OF CONTENTS... 2 COURSE SYLLABUS... 3 Course... 3 Student Pre-requisites... 3 Laptop Requirements...

More information

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9. Course Outline Pearson: Certified Ethical Hacker Version 9 27 Jun 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

Required Textbook and Materials. Course Objectives. Course Outline

Required Textbook and Materials. Course Objectives. Course Outline Information Technology Security (ITSY 1342) Credit: 3 semester credit hours (2 hours lecture, 4 hours lab) Prerequisite/Co-requisite: None Course Description Instruction in security for network hardware,

More information

South Portland, Maine Computer Information Security

South Portland, Maine Computer Information Security South Portland, Maine 04106 Computer Information Title: Fundamentals of Network Catalog Number: INSC 160 Credit Hours: 4 Total Contact Hours: 60 Lecture (or Lab): Lecture/Lab/on-line Instructor: Wendy

More information

CRN150 Fundamentals of Network Security

CRN150 Fundamentals of Network Security CRN150 Fundamentals of Network Security Course Information Credits 3 Washburn University Institute of Technology 5724 SW Huntoon Street Topeka, Kansas 66604 Phone: 785.670.3441 Office Fax: 785.273.7080

More information

AE Computer Programming for Aerospace Engineers

AE Computer Programming for Aerospace Engineers AE 030 - Computer Programming for Aerospace Engineers Instructor Information: Credit: Professor Long Lu Long.Lu@sjsu.edu 2 units Class Times & Locations: Section 01 (Lecture): M 16:30-17:20 in CL 226 Section

More information

COMPUTER TECHNOLOGY (COMT)

COMPUTER TECHNOLOGY (COMT) Kent State University Catalog 2017-2018 1 COMPUTER TECHNOLOGY (COMT) COMT 11000 INTRODUCTION TO OFFICE PRODUCTIVITY APPS 3 Credit (Equivalent to MIS 24053) Covers the basic concepts and use of computer

More information

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015 CATALOG DESCRIPTION ONLINE EEGR.483 INTRODUCTION TO SECURITY MANAGEMENT CREDITS: 3 THIS COURSE IS A

More information

Course Syllabus Web Page Design I IMED 1316

Course Syllabus Web Page Design I IMED 1316 Course Syllabus Web Page Design I IMED 1316 Semester with Course Reference Number (CRN Instructor contact information (phone number and email address) Office Location and Hours Course Location/Times Course

More information

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02 Semester Information Technology AS Fall 2015 Information Technology AS Proposed Network Admin & Security

More information

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary Takeaways You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent. IDPS Effectiveness and Primary

More information

Practice Labs Ethical Hacker

Practice Labs Ethical Hacker Practice Labs Ethical Hacker Lab Outline The Ethical Hacker Practice Lab will provide you with the necessary platform to gain hands on skills in security. By completing the lab tasks you will improve your

More information

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies: This course supports the objective assessments for the Outside vendor certification for EC-Council Certified Ethical Hacker. The course covers 6 competencies and represents 3 competency units. Introduction

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

ISM 324: Information Systems Security Spring 2014

ISM 324: Information Systems Security Spring 2014 ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method

More information

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On ) Course Outline 12 Oct 2018 ( Add-On ) Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant

More information

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security HTML PHP Database Linux Operating System and Networking: LINUX NETWORKING Information Gathering:

More information

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015 I. COURSE DESCRIPTION An overview of information system security to include managing security, protecting information technology

More information

COLLEGE OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COURSE SYLLABUS/SPECIFICATION

COLLEGE OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COURSE SYLLABUS/SPECIFICATION COLLEGE OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COURSE SYLLABUS/SPECIFICATION CODE & TITLE: ITCS 334 Introduction to PL/SQL (ODBA 2) WEIGHT: (2-2 - 3) PREREQUISITE: ITCS 333 DESCRIPTION:

More information

Course Syllabus: CompTIA Network+

Course Syllabus: CompTIA Network+ Course Syllabus: CompTIA Network+ Instructor: Roger Elliott Email: relliott@c-tec.edu Phone: Office: (740) 364-2299 Cell (740) 814-7504 Courseware Course #: Hours: TestOut Network Pro 4.1 CompTIA Network+

More information

Certified Ethical Hacker V9

Certified Ethical Hacker V9 Certified Ethical Hacker V9 Certificate: Certified Ethical Hacker Duration: 5 Days Course Delivery: Blended Course Description: Accreditor: EC Council Language: English This is the world s most advanced

More information

Faculty of Science & Information Technology

Faculty of Science & Information Technology Faculty of Science & Information Technology Department: Computer Science COURSE SYLLABUS Short Description Student s Copy One copy of this course syllabus is provided to each student registered in this

More information

ITSC 1319 INTERNET/WEB PAGE DEVELOPMENT SYLLABUS

ITSC 1319 INTERNET/WEB PAGE DEVELOPMENT SYLLABUS SAIGONTECH ITSC 1319 INTERNET/WEB PAGE DEVELOPMENT SYLLABUS CRN: Semester: Summer 2015 Class name: IWPD Campus and Room: SaigonTech Tower Lab 211 Days and Times: Lecture: Tue. 7:30 11:45 Tutor: Fri. 7:30

More information

cs642 /introduction computer security adam everspaugh

cs642 /introduction computer security adam everspaugh cs642 computer security /introduction adam everspaugh ace@cs.wisc.edu definition Computer Security := understanding and improving the behavior of computing systems in the presence of adversaries adversaries

More information

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services Following topics will be covered: Module 1: Penetration Testing Planning and Scoping - Types of penetration testing and ethical hacking projects - Penetration testing methodology - Limitations and benefits

More information

DIS10.1 Ethical Hacking and Countermeasures

DIS10.1 Ethical Hacking and Countermeasures DIS10.1 Ethical Hacking and Countermeasures ABOUT DIS Why choose Us. Data and internet security council is the worlds top most information security certification body. Our uniquely designed course for

More information

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog. CSCI 631 Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase

More information

Common Syllabus revised

Common Syllabus revised Department of Information Sciences and Technology Volgenau School of Engineering IT 369 Data and Application Security Common revised 08.23.2018 This syllabus contains information common to all sections

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education COURSE OF STUDY 2017-2018 (C)ITM 820 Information Systems Security and Privacy

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

DIS10.1:Ethical Hacking and Countermeasures

DIS10.1:Ethical Hacking and Countermeasures 1 Data and Information security Council DIS10.1:Ethical Hacking and Countermeasures HACKERS ARE NOT BORN, THEY BECOME HACKER About DIS :Data and Internet Security Council DIS is the Globally trusted Brand

More information

IT Technician Pathways Course Guide

IT Technician Pathways Course Guide IT Technician Pathways Course Guide Stage Computer Retail Sales and Support Course Name or Topic Introduction to Retail or Business Fundamentals Related 3 rd Party Certifications C-ID IT-MC C-ID BUS 100

More information

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010 FIT3056 Secure and trusted software systems Unit Guide Semester 2, 2010 The information contained in this unit guide is correct at time of publication. The University has the right to change any of the

More information

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline Pearson CompTIA: Security+ SY0-401 (Course & Lab) 03 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

COURSE SYLLABUS BMIS 662 TELECOMMUNICATIONS AND NETWORK SECURITY

COURSE SYLLABUS BMIS 662 TELECOMMUNICATIONS AND NETWORK SECURITY BMIS 662 Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase

More information

CCNA Cybersecurity Operations 1.1 Scope and Sequence

CCNA Cybersecurity Operations 1.1 Scope and Sequence CCNA Cybersecurity Operations 1.1 Scope and Sequence Last updated June 18, 2018 Introduction Today's organizations are challenged with rapidly detecting cybersecurity breaches and effectively responding

More information

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS HOLY ANGEL UNIVERSITY LLEGE OF INFORMATION AND MMUNICATIONS TECHNOLOGY CYBER SECURITY URSE SYLLABUS Course Code : 6CSEC Prerequisite : 6MPRO2L Course Credit : 3 Units (2 hours LEC,3 hours LAB) Year Level:

More information

CSWAE Certified Secure Web Application Engineer

CSWAE Certified Secure Web Application Engineer CSWAE Certified Secure Web Application Engineer Overview Organizations and governments fall victim to internet based attacks every day. In many cases, web attacks could be thwarted but hackers, organized

More information

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog. CSCI 681 Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase

More information

Division of Engineering, Computer Programming, and Technology

Division of Engineering, Computer Programming, and Technology 1 of 10 8/27/2017, 6:42 PM Jump to Today Edit Division of Engineering, Computer Programming, and Technology Department of Network Engineering Technology National Center of Academic Excellence in Information

More information

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. EC Council Certified Ethical Hacker V9 This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different

More information

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX ADVANCED SYSTEM & NETWORK ADMINISTRATION CSIT 2475

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX ADVANCED SYSTEM & NETWORK ADMINISTRATION CSIT 2475 PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX ADVANCED SYSTEM & NETWORK ADMINISTRATION CSIT 2475 Class Hours: 3.0 Credit Hours: 4.0 Laboratory Hours: 3.0 Revised: Fall 09 Catalog Course Description:

More information

Computer Information Systems Technology (CIS)

Computer Information Systems Technology (CIS) Technology 104 The College for Real Careers Technology (CIS) Program Information The department at H. Councill Trenholm State Community College is progressive and innovative in its approach toward the

More information

CRAW Security. CRAW Security

CRAW Security. CRAW Security Course Description The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH,

More information

ITT Technical Institute. SD3120T Programming in Open Source with LAMP Onsite and Online Course SYLLABUS

ITT Technical Institute. SD3120T Programming in Open Source with LAMP Onsite and Online Course SYLLABUS ITT Technical Institute SD3120T Programming in Open Source with LAMP Onsite and Online Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 67 (41 Theory Hours, 26 Lab Hours Prerequisite(s and/or

More information

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018 Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible

More information

SYLLABUS. Departmental Syllabus. Modern Publication Design JOUR0180. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. Modern Publication Design JOUR0180. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus DATE OF LAST REVIEW: 02/2013 CIP CODE: 10.0303 SYLLABUS SEMESTER: COURSE TITLE: COURSE NUMBER: Modern Publication Design JOUR0180 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL:

More information

SYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 12/5/2014 CIP CODE: 11.1006 SEMESTER: COURSE TITLE: COURSE NUMBER: CompTIA A+ Practical Applications CRTE0101 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE:

More information

Del Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358

Del Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358 Del Mar College Master Course Syllabus UNIX System Administration Course Number: ITSC1358 College Year: 2010 Professor Name: David Hattox Semester: Fall Office Location: VB124 Phone Contact: 698-1112 DMC

More information

In this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".

In this course, you need to use Pearson etext. Go to Pearson etext and Video Notes. **Disclaimer** This syllabus is to be used as a guideline only. The information provided is a summary of topics to be covered in the class. Information contained in this document such as assignments, grading

More information

IT Systems Administrator

IT Systems Administrator IT Systems Administrator PROGRAM OBJECTIVES The IT Systems Administrator program will provide students with the skills and knowledge to pursue certifications and careers in computer and networkrelated

More information

CTS1134C Network Essentials (3 Credits), Fall 2018

CTS1134C Network Essentials (3 Credits), Fall 2018 Course Syllabus Division of Engineering, Computer Programming, and Technology Department of Computer Information Technology West Campus Building 7, Room 146 (407) 582-1542 National Center of Academic Excellence

More information

(CNS-301) Citrix NetScaler 11 Advance Implementation

(CNS-301) Citrix NetScaler 11 Advance Implementation (CNS-301) Citrix NetScaler 11 Advance Implementation Overview Designed for students with previous NetScaler experience, this course is best suited for individuals who will be deploying or managing advanced

More information

ITE 119 Information Literacy

ITE 119 Information Literacy ITE 119 Information Literacy COURSE OUTLINE Prerequisites: These are basic computer skills that are necessary to facilitate your successful completion in this course. Students must be able to read and

More information

New York City College of Technology/CUNY Department of Computer Systems Technology. CST2400 Computer System Management and Support 4 hours 3 credits

New York City College of Technology/CUNY Department of Computer Systems Technology. CST2400 Computer System Management and Support 4 hours 3 credits New York City College of Technology/CUNY Department of Computer Systems Technology CST2400 Computer System Management and Support 4 hours 3 credits Instructor: Office Phone: Office Hours: Class Meetings:

More information