Jan 19, 2021  
2016-2017 Catalog 
    
2016-2017 Catalog [PAST CATALOG]

CTS 250 - Certified Ethical Hacking and Countermeasures

4 credit hours - Four hours of lecture and directed laboratory weekly; one term.
CSI 262 - Certified Ethical Hacking and Countermeasures

Learn the threats that are challenging the priorities and processes used to protect our computer and network systems. Examine topics including hacker tools, techniques, methods, scripts and automated hacking malware employed in today’s cyber environment. Investigate the processes and procedures used by hackers, along with corresponding countermeasures that can be employed to protect against such attacks. This course is designed to help prepare students for the Certified Ethical Hacking certification exam. Lab fee $100.

Prerequisite(s): CTS 240  or permission of CTS department chair.

Course Outcomes
Upon successful completion of this course, students will be able to:
 

  • Examine the legal implication of hacking and the penalties of unauthorized system entry as defined by Federal and State Laws.
    • Identify the Federal and State Laws governing the use of ethical hacking
  • Apply computer tools that provide system reconnaissance and information gathering in a network environment.
    • Identify the Federal and State Laws governing the use of ethical hacking
    • Illustrate the the use of enumeration systems in the hacking hierarchy
  • Differentiate between computer scanning tools, and their use in determining computer and network availability and vulnerability.
    • Employ scanning tools to discover system vulnerabilities to system hacking
  • Differentiate between computer scanning tools, and their use in determining computer and network availability and vulnerability.
    • Identify and apply Trojan and backdoor tools to penetrate systems
    • Identify and apply social engineering tools used to login to unauthorized computer resources
    • Identify and apply buffer overflow tools to gain access to a computer
    • Identify and apply evasive techniques to avoid identification by IDS systems, honeypots and firewalls.
  • Examine other hacking techniques to penetrate network systems and resources.
    • Demonstrate the use of session hijacking tools to gain control of a computer.
    • Illustrate the use of Web Server Hacking tools to gain control of network resources.
    • Demonstrate the use of password cracking tools to gain unauthorized access to a computer.
    • Employ the use of SQL hacking techniques to gain unauthorized access to network resources.
    • Demonstrate the use of Wireless hacking tools to gain unauthorized access to network resources.
    • Illustrate the use of viruses and worms and how penetrate computer and network systems.
    • Illustrate the use of cryptography in helping to avoid IDS detection.
  • Experiment with the use of defensive tools and techniques to protect network systems and resources from unauthorized penetration.
    • Employ the use of physical security in protecting system resources.
    • Demonstrate knowledge of, and the ability to use penetration testing methodologies to protect systems.
Core Competencies
Core 2 Technology Fluency Core 8 Social and Civic Responsibility Core 10 Innovative and Critical Thinking