Active Outline

General Information


Course ID (CB01A and CB01B)
CISD102.
Course Title (CB02)
Ethical Hacking
Course Credit Status
Credit - Degree Applicable
Effective Term
Fall 2023
Course Description
Students will scan, test, hack and secure systems. Implement perimeter defenses, scan and attack virtual networks. Other topics include intrusion detection, social engineering, footprinting, DDoS attacks, buffer overflows, SQL injection, privilege escalation, trojans, backdoors, and wireless hacking. Legal restrictions and ethical guidelines emphasized. This course also helps prepare students to pass the Certified Ethical Hacker (C|EH) exam.
Faculty Requirements
Course Family
Not Applicable

Course Justification


This is a course in a CTE program that was developed based on state and national trends needing computer security professionals. This course belongs on the Enterprise Security Professional Certificates and AA degree. This course provides students with the ethical hacking skills for computer security and supports professional employment in the Silicon Valley.

Foothill Equivalency


Does the course have a Foothill equivalent?
No
Foothill Course ID

Course Philosophy


Formerly Statement


Course Development Options


Basic Skill Status (CB08)
Course is not a basic skills course.
Grade Options
  • Letter Grade
  • Pass/No Pass
Repeat Limit
0

Transferability & Gen. Ed. Options


Transferability
Not transferable

Units and Hours


Summary

Minimum Credit Units
4.5
Maximum Credit Units
4.5

Weekly Student Hours

TypeIn ClassOut of Class
Lecture Hours4.08.0
Laboratory Hours1.50.0

Course Student Hours

Course Duration (Weeks)
12.0
Hours per unit divisor
36.0
Course In-Class (Contact) Hours
Lecture
48.0
Laboratory
18.0
Total
66.0
Course Out-of-Class Hours
Lecture
96.0
Laboratory
0.0
NA
0.0
Total
96.0

Prerequisite(s)


Corequisite(s)


Advisory(ies)


ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.

CIS D006. and CIS D108.

Limitation(s) on Enrollment


Entrance Skill(s)


General Course Statement(s)


Methods of Instruction


Lecture and visual aids

Discussion of assigned reading

Discussion and problem solving performed in class

Quiz and examination review performed in class

Homework and extended projects

Assignments


  1. Reading assignments
  2. Complete assigned homework review questions
  3. View assigned security videos

Methods of Evaluation


  1. Final exam and midterm or quizzes based on comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts. These are evaluated on correctness.
  2. Participation in lab skills exercises that demonstrate ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.

Essential Student Materials/Essential College Facilities


Essential Student Materials: 
  • None.
Essential College Facilities:
  • None.

Examples of Primary Texts and References


AuthorTitlePublisherDate/EditionISBN
Walker, Matt. "CEH Certified Ethical Hacker Boxed Set." Edition 3. McGraw-Hill USA, 2017.

Examples of Supporting Texts and References


AuthorTitlePublisher
Sean-Philip Oriyano "Hacker Techniques, Tools, and Incident Handling." Second Edition. Jones and Bartlett Learning LLC, an Ascent Learning Company, 2017

Learning Outcomes and Objectives


Course Objectives

  • Explore ethical hacking basics
  • Explore cryptography
  • Investigate reconnaissance: Information gathering for the ethical hacker
  • Explore scanning and enumeration
  • Explore hacking through the network: Sniffers and evasion
  • Investigate how to attack a computer system
  • Explore low tech hacking techniques
  • Investigate web-based hacking
  • Explore wireless network hacking
  • Investigate trojans and other attacks
  • Perform penetration testing

CSLOs

  • Demonstrate the ability to attack and defend a network.

Outline


  1. Explore ethical hacking basics
    1. Introduction to Ethical Hacking
    2. Legal hacking: Laws and guidelines
  2. Explore cryptography
    1. Cryptography and encryption overview
    2. PKI, the digital certificate, and digital signatures
    3. Encrypted communication and cryptography attacks
  3. Investigate reconnaissance: Information gathering for the ethical hacker
    1. Vulnerability research
    2. Footprinting
  4. Explore scanning and enumeration
    1. Scanning for targets
    2. Enumeration
  5. Explore hacking through the network: Sniffers and evasion
    1. Sniffing
    2. Network roadblocks
      1. Intrusion detection
      2. Firewall and honeypots
  6. Investigate how to attack a computer system
    1. Windows system hacking
    2. Linux hacking
  7. Explore low tech hacking techniques
    1. Social engineering
    2. Physical security
  8. Investigate web-based hacking
    1. Attacking web servers
    2. Attacking web applications
  9. Explore wireless network hacking
    1. Wireless Concepts
      1. Network architecture and standards
      2. Finding and identifying wireless networks
    2. Wireless hacking
      1. Wireless attacks
      2. Bluetooth attacks
  10. Investigate trojans and other attacks
    1. Trojans, backdoors, viruses, and worm attacks
    2. Denial of service attacks
    3. Session hijacking
  11. Perform penetration testing
    1. Methodology and Steps
      1. The security assessments
      2. Security assessment deliverables
    2. Information Gathering and Analysis

Lab Topics


  1. Use Metasploit to take over a Windows computer.
  2. Steal passwords with a packet sniffer
  3. Use whois command
  4. Utilize port scan software and firewalls
  5. Analyze types of port scans
  6. Use software keylogger to hack computer passwords
  7. Crack Windows passwords with Ophcrack
  8. Perform a Denial of Service attack with Nmap
  9. Utilize the Nessus vulnerability scanner
Back to Top