ITSY 2330 Intrusion Detection Course Syllabus

Similar documents
Computer Science Technology Department

Computer Science Technology Department

ITSY Information Technology Security Course Syllabus Spring 2018

Computer Science Technology Department

Computer Science Technology Department

Computer Science Technology Department

Computer Science Technology Houston Community College

ab Houston Community College

ITNW 1425 Fundamentals of Networking Technologies Course Syllabus fall 2012

ab Houston Community College

Computer Science Technology Houston Community College

Computer Science Technology Department

Course Syllabus Internal Control And Auditing ACNT 2331

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Instructor: Eric Rettke Phone: (every few days)

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Network Security

EC-Council C EH. Certified Ethical Hacker. Program Brochure

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

CPTE: Certified Penetration Testing Engineer

Advisory: Students should have already taken MICROCOMPUTER APPLICATIONS II - 431

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

1. Query and manipulate data with Entity Framework.

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

EC-Council. Program Brochure. EC-Council. Page 1

Standard Course Outline IS 656 Information Systems Security and Assurance

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Ethical Hacking and Prevention

Certified Ethical Hacker

EC-Council - EC-Council Certified Security Analyst (ECSA) v8

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Matt Walker s All in One Course for the CEH Exam. Course Outline. Matt Walker s All in One Course for the CEH Exam.

Certified Ethical Hacker (CEH)

Cyber Security CYBER SECURITY

EC-Council C EH. Certified Ethical Hacker. Program Brochure

CEH: CERTIFIED ETHICAL HACKER v9

Course 831 Certified Ethical Hacker v9

USF Sarasota-Manatee - New Undergraduate Course Proposal Form

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

CS 3030 Scripting Languages Syllabus

CS 3030 Scripting Languages Syllabus

Hands-On Hacking Course Syllabus

Pearson: Certified Ethical Hacker Version 9. Course Outline. Pearson: Certified Ethical Hacker Version 9.

Required Textbook and Materials. Course Objectives. Course Outline

South Portland, Maine Computer Information Security

CRN150 Fundamentals of Network Security

AE Computer Programming for Aerospace Engineers

COMPUTER TECHNOLOGY (COMT)

MORGAN STATE UNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING COURSE SYLLABUS FALL, 2015

Course Syllabus Web Page Design I IMED 1316

Information Technology AS and Network Administration & Security AAS Proposed Changes Version 02. Network Admin & Security AAS Proposed

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

Practice Labs Ethical Hacker

Introduction. Competencies. This course provides guidance to help you demonstrate the following 6 competencies:

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

ISM 324: Information Systems Security Spring 2014

CIW: Web Security Associate. Course Outline. CIW: Web Security Associate. 12 Oct ( Add-On )

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

COLLEGE OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY COURSE SYLLABUS/SPECIFICATION

Course Syllabus: CompTIA Network+

Certified Ethical Hacker V9

Faculty of Science & Information Technology

ITSC 1319 INTERNET/WEB PAGE DEVELOPMENT SYLLABUS

cs642 /introduction computer security adam everspaugh

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

DIS10.1 Ethical Hacking and Countermeasures

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Common Syllabus revised

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

DIS10.1:Ethical Hacking and Countermeasures

IT Technician Pathways Course Guide

FIT3056 Secure and trusted software systems. Unit Guide. Semester 2, 2010

Pearson CompTIA: Security+ SY0-401 (Course & Lab) Course Outline. Pearson CompTIA: Security+ SY0-401 (Course & Lab)

COURSE SYLLABUS BMIS 662 TELECOMMUNICATIONS AND NETWORK SECURITY

CCNA Cybersecurity Operations 1.1 Scope and Sequence

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

CSWAE Certified Secure Web Application Engineer

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Division of Engineering, Computer Programming, and Technology

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

PELLISSIPPI STATE COMMUNITY COLLEGE MASTER SYLLABUS LINUX ADVANCED SYSTEM & NETWORK ADMINISTRATION CSIT 2475

Computer Information Systems Technology (CIS)

CRAW Security. CRAW Security

ITT Technical Institute. SD3120T Programming in Open Source with LAMP Onsite and Online Course SYLLABUS

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

SYLLABUS. Departmental Syllabus. Modern Publication Design JOUR0180. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus. CompTIA A+ Practical Applications. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

Del Mar College Master Course Syllabus. UNIX System Administration Course Number: ITSC1358

In this course, you need to use Pearson etext. Go to "Pearson etext and Video Notes".

IT Systems Administrator

CTS1134C Network Essentials (3 Credits), Fall 2018

(CNS-301) Citrix NetScaler 11 Advance Implementation

ITE 119 Information Literacy

New York City College of Technology/CUNY Department of Computer Systems Technology. CST2400 Computer System Management and Support 4 hours 3 credits

Transcription:

ITSY 2330 Intrusion Detection Course Syllabus Instructor Course Reference Number (CRN) Course Description: Course Prerequisite(s) Course Semester Credit Hours (SCH) (Lecture, Lab) Name: Hung Le Tel: Office: 713-718-6427 Email: hung.le8@hccs.edu Website: http://eagle.hccs.edu/faculty/le_h 59110 Course Level Advanced Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors. ITSY 2300 Operating System Security Credit Hours 3.0 (Lecture 2, Lab 4) Course Location/Times JDB 208, HCC Central Campus Monday 06.00-10.00 PM Total Course Contact Hours 96 Instructional Materials Instructional Methods (select one) Hands-On Ethical Hacking And Network Defense, 2nd Edition. Author: Michael T. Simpson. ISBN-10: 1435486099; ISBN-13: 9781435486096. Publisher: Course Technology Cengage Learning Face to Face Type of Instruction Lecture/Lab, COOP, Practicum, or Lecture Course Length (number of weeks) 16 Weeks Computer Science Technology Department Page 1 of 6

Course Requirement, Policy, and Course Calendar Instructor's Requirements Instructor Grading Criteria Access to a PC running Windows XP/Vista/Windows 7/Linux/Unix with internet access. Access to a PC running Linux operating system PC should have access to the SSH shell (download from ce.uml.edu/ssh.htm) Textbook 10 quizzes @ 20 pts each-----------200 pts 22 Projects----------------------------320 pts Final exam----------------------------80 pts --------------- Total-----------------------------------600 pts A = 90% - 100% B = 80% - 89% C = 70% - 79% D = 60% - 69% F = below 59% Course Calendar Date Quiz Topic 8/29/2011 Ch 1: Ethical Hacking Overview & The Security Circus 9/5/2011 No class Labor Day Holiday 9/12/2011 Ch 2: TCP/IP Concepts Review 9/19/2011 Ch 3: Network and Computer Attacks 9/26/2011 Quiz on Ch 1-3 Project 1-3 due Ch 4: Footprinting and Social Engineering 10/3/2011 Quiz on Ch 4 Ch 5: Port Scanning Proj 4 &5 due 10/10/2011 Quiz on Ch 5 Proj 6 & 7 due Ch 6: Enumeration Computer Science Technology Department Page 2 of 6

10/17/2001 Quiz on Ch 6 Proj 8 & 9 due 10/24/2011 Quiz on Ch 7 Proj 10 & 11 due 10/31/2011 Quiz on Ch 8 Proj 12 & 13 due 11/7/2011 Quiz on Ch 9 Proj 14 & 15 due 11/14/2011 Quiz on Ch 10 Proj 16 & 17 due 11/21/2011 Quiz on Ch 11 Proj 18 & 19 due 11/28/2011 Quiz on Ch 12 Proj 20 & 21 due 12/5/2011 Last class meeting Proj 22 due Ch 7: Programming for Security Professionals Ch 8: Desktop and Server OS Vulnerabilites Ch 9: Embedded Operating Systems: The Hidden Threat Ch 10: Hacking Web Servers Ch 11: Hacking Wireless Networks Ch 12: Cryptography Ch 13: Network Protection Systems Topic to be announced 12/12/2011 Final Exam Learning Objective, Students Learning Outcome, and Program Spec Note: This section of the syllabus provides the general course learning objectives, the expected students learning outcome, the course scope in terms of the department program, and the instrument used to evaluate the course. If you have any question, contact the instructor or the department. HCC Grading Scale Grade GPA Points A = 100-90 4 points per semester hour B = 89-80: 3 points per semester hour C = 79-70: 2 points per semester hour D = 69-60: 1 points per semester hour 59 and below = F IP (In Progress) W(Withdrawn) I (Incomplete) AUD (Audit) IP (In Progress) is given only in certain developmental courses. The student must re-enroll to receive credit. COM (Completed) is given in non-credit and continuing education courses. To compute grade point average (GPA), divide the total grade points by the total number of semester hours attempted. The grades "IP," "COM" and "I" do not affect GPA. Computer Science Technology Department Page 3 of 6

Course Student Learning Outcomes (SLO): Learning Objectives 1. Use appropriate integrated software to solve contemporary real-world problems. 2. Integrate appropriate features from several commonly used application programs to generate a document (or set of documents) that solves a contemporary real-world problem. 3. Use Spreadsheets to create a chart with the statistics you plan to use in your presentation slideshow. 4. Demonstrate proper file management techniques to manipulate files and folders in a networked environment. 5. Apply proper formatting techniques to a document draft so that it models a previously formatted document. 6. Develop an algorithm that solves a problem. 7. Demonstrate the effective use of search engines to find reliable and relevant internet resources. 8. Create data that can be edited and kept current. 9. Demonstrate effective oral presentation skills using a slideshow (created with a presentation graphics program) as a visual aid. Upon successful completion of this course, the student will be able to: A. Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers. B. Define the types of malicious software found in modern networks. C. Explain the threats and countermeasures for physical security and social engineering. D. Perform footprinting to learn about a company and its network. E. Perform port scans to locate potential entry points to servers and networks. F. Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets. G. Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals. H. Learn how to identify Microsoft Windows vulnerabilities and to harden systems. I. Learn how to identify Linux vulnerabilities and to protect servers. J. Describe how to take control of Web Servers, and how to protect them. K. Locate and hack into wireless networks, and protect them. L. Explain how cryptography and hashing work, and perform attacks against them such as password cracking and man-in-the-middle attacks. M. Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots. Student Assignments Student Assessment(s) Refer to the course calendar 1. Use appropriate integrated software to solve contemporary real-world problems. 2. Integrate appropriate features from several commonly used application programs to generate a document (or set of documents) that solves a contemporary realworld problem. 3. Use Spreadsheets to create a chart with the statistics you plan to use in your presentation slideshow. 4. Demonstrate proper file management techniques to manipulate files and folders in Computer Science Technology Department Page 4 of 6

a networked environment. 5. Apply proper formatting techniques to a document draft so that it models a previously formatted document. 6. Develop an algorithm that solves a problem. 7. Demonstrate the effective use of search engines to find reliable and relevant internet resources. 8. Create data that can be edited and kept current. 9. Demonstrate effective oral presentation skills using a slideshow (created with a presentation graphics program) as a visual aid. Program/Discipline Requirements: Academic Discipline/CTE Program Learning Outcomes SCANS and/or Core Curriculum Competencies: If applicable Instructors will use syllabus that will satisfy CurricuUNET requirements and improve ongoing assessment of student-centered learning and teaching. 1. 1. Develop essential operating systems skills including how to use, setup, configure, troubleshoot and maintain a current microcomputer operating system 2. Use and configure essential office applications and 3. Help other technology users, develop training and maintenance plans and to translate new technical knowledge so that others can use it 4. Install, configure, and administer Linux/UNIX and other systems. 5. Document work log, write clearly and appropriately in an Information Technology context, respect user s data, including backup and security SCANS 1. C1: Allocates Time Students will learn to allocate time to perform each task (online course will emphasize this task more). 2. C5: Acquires and Evaluates Information Student will be able to identify need for data, obtain it from existing sources or create them, and evaluate information. 3. C6: Organizes and Maintains Information Students will learn to organize their assignments and manage to complete them with specific deadline. 4. C18: Selects Technology Students will use flowcharts to understand the subject. Students will select appropriate compiler to run program. 5. C20: Maintains and Troubleshoots Technology Student will be able to prevent, identify or solve problems in machines, computers, and other technologies. 6. F9: Problem Solving Students will learn problem-solving methodology (pseudocode). 7. F10: Seeing Things in the Minds Eye Student will be able to organize and process symbols, pictures, graphs, objects or other information. Every semester, calendar based weekly learning material (reading, hands exercises for inclass, web enhanced, or online assignments, and scheduled quiz/test/exam) will be posted as part of the syllabus. Computer Science Technology Department Page 5 of 6

HCC Policy Statement Access Student Services Policies on their Web site: http://hccs.edu/student-rights Distance Education and/or Continuing Education Policies Access DE Policies on their Web site: Access CE Policies on their Web site for non-credit classes: http://de.hccs.edu/de/de-student-handbook http://hccs.edu/ce-student-guidelines Competencies: If applicable Computer Science Technology Department Page 6 of 6