Jan 15, 2021  
2016-2017 Catalog 
    
2016-2017 Catalog [PAST CATALOG]

CTS 242 - Network Intrusion Detection and Penetration Testing

4 credit hours - Four hours of lecture and directed laboratory weekly; one term.
(Formerly CSI 219 - Network Intrusion Detection and Penetration Testing)

Learn the threats that are challenging the priorities and processes used to protect our computer and network systems. Examine the tools and techniques used for traffic and intrusion analysis including hacker tools, methods, scripts and automated hacking malware employed in today’s cyber environment. Investigate the processes and procedures used by hackers, along with corresponding countermeasures that can be employed to protect against such attacks. Lab fee $50.

Prerequisite(s): CTS 140  

Note: A working knowledge of Linux is highly recommended prior to taking this course.

Course Outcomes
Upon successful completion of this course, students will be able to:
  • Identify and utilize the phases of a penetration testing attack
    • Utilize both passive and active footprinting/intelligence gathering
    • Perform different scanning techniques
  • Understand and exploit system vulnerabilities
    • Crack passwords and implement countermeasures for password cracking
    • Implement spyware and keylogger countermeasures
    • Examine methods attackers use to cover tracks
    • Execute applications remotely and describe countermeasures that should be implemented
  • Perform packet analysis
    • Explain TCP operation (sequence numbers, port numbers, control messages, etc).
    • Describe UDP operation
    • Differentiate between IPv4 and IPv6
  • Troubleshoot network and security problems
    • Utilize network sniffing tools
    • Identify and employ a network troubleshooting methodology
  • Perform vulnerability analysis
    • Install, configure and run a vulnerability analyzer
    • Analyze vulnerability analyzer reports
    • Identify system vulnerabilities and provide risk management recommendations
  • Describe the concepts and issues related to Risk Analysis
    • Explain the concepts of Risk Analysis
    • Describe the methods of Risk Analysis
    • Describe the techniques to minimize risk
  • Implement Network Protection Systems
    • Configure and implement an Intrusion Detection System
    • Explain the purpose of routers, firewalls, and honeypots
Core Competencies
Core 1 Communication Core 10 Innovative and Critical Thinking