|
Nov 22, 2024
|
|
|
|
2023-2024 Catalog [PAST CATALOG]
|
CTS 242 - Network Intrusion Detection and Penetration Testing4 credit hours - Four hours of lecture and directed laboratory weekly; one term. Formerly CSI 219 - Network Intrusion Detection and Penetration Testing
Learn the threats that are challenging the priorities and processes used to protect our computer and network systems. Examine the tools and techniques used for traffic and intrusion analysis including hacker tools, methods, scripts and automated hacking malware employed in today’s cyber environment. Investigate the processes and procedures used by hackers, along with corresponding countermeasures that can be employed to protect against such attacks. Lab fee $2.
Prerequisite(s): CTS 140 .
Note: A working knowledge of Linux is highly recommended prior to taking this course. Typically offered at MC and OL; fall and spring terms.
Course Outcomes:
- Identify and utilize the phases of a penetration testing attack
- Utilize both passive and active footprinting/intelligence gathering
- Perform different scanning techniques
- Understand and exploit system vulnerabilities
- Crack passwords and implement countermeasures for password cracking
- Implement spyware and keylogger countermeasures
- Examine methods attackers use to cover tracks
- Execute applications remotely and describe countermeasures that should be implemented
- Perform packet analysis
- Explain TCP operation (sequence numbers, port numbers, control messages, etc).
- Describe UDP operation
- Differentiate between IPv4 and IPv6
- Troubleshoot network and security problems
- Utilize network sniffing tools
- Identify and employ a network troubleshooting methodology
- Perform vulnerability analysis
- Install, configure and run a vulnerability analyzer
- Analyze vulnerability analyzer reports
- Identify system vulnerabilities and provide risk management recommendations
- Describe the concepts and issues related to Risk Analysis
- Explain the concepts of Risk Analysis
- Describe the methods of Risk Analysis
- Describe the techniques to minimize risk
- Implement Network Protection Systems
- Configure and implement an Intrusion Detection System
- Explain the purpose of routers, firewalls, and honeypots
|
|