Active Outline
General Information
- Course ID (CB01A and CB01B)
- CISD102.
- Course Title (CB02)
- Ethical Hacking
- Course Credit Status
- Credit - Degree Applicable
- Effective Term
- Fall 2023
- Course Description
- Students will scan, test, hack and secure systems. Implement perimeter defenses, scan and attack virtual networks. Other topics include intrusion detection, social engineering, footprinting, DDoS attacks, buffer overflows, SQL injection, privilege escalation, trojans, backdoors, and wireless hacking. Legal restrictions and ethical guidelines emphasized. This course also helps prepare students to pass the Certified Ethical Hacker (C|EH) exam.
- Faculty Requirements
- Course Family
- Not Applicable
Course Justification
This is a course in a CTE program that was developed based on state and national trends needing computer security professionals. This course belongs on the Enterprise Security Professional Certificates and AA degree. This course provides students with the ethical hacking skills for computer security and supports professional employment in the Silicon Valley.
Foothill Equivalency
- Does the course have a Foothill equivalent?
- No
- Foothill Course ID
Formerly Statement
Course Development Options
- Basic Skill Status (CB08)
- Course is not a basic skills course.
- Grade Options
- Letter Grade
- Pass/No Pass
- Repeat Limit
- 0
Transferability & Gen. Ed. Options
- Transferability
- Not transferable
Units and Hours
Summary
- Minimum Credit Units
- 4.5
- Maximum Credit Units
- 4.5
Weekly Student Hours
Type | In Class | Out of Class |
---|---|---|
Lecture Hours | 4.0 | 8.0 |
Laboratory Hours | 1.5 | 0.0 |
Course Student Hours
- Course Duration (Weeks)
- 12.0
- Hours per unit divisor
- 36.0
Course In-Class (Contact) Hours
- Lecture
- 48.0
- Laboratory
- 18.0
- Total
- 66.0
Course Out-of-Class Hours
- Lecture
- 96.0
- Laboratory
- 0.0
- NA
- 0.0
- Total
- 96.0
Prerequisite(s)
Corequisite(s)
Advisory(ies)
ESL D261. and ESL D265., or ESL D461. and ESL D465., or eligibility for EWRT D001A or EWRT D01AH or ESL D005.
CIS D006. and CIS D108.
Limitation(s) on Enrollment
Entrance Skill(s)
General Course Statement(s)
Methods of Instruction
Lecture and visual aids
Discussion of assigned reading
Discussion and problem solving performed in class
Quiz and examination review performed in class
Homework and extended projects
Assignments
- Reading assignments
- Complete assigned homework review questions
- View assigned security videos
Methods of Evaluation
- Final exam and midterm or quizzes based on comprehension and mastery of key terms and concepts as well as application skills related to analysis and synthesis of computer concepts. These are evaluated on correctness.
- Participation in lab skills exercises that demonstrate ability to critically evaluate the proper use of appropriate computer security software to complete a given set of computer-related tasks.
Essential Student Materials/Essential College Facilities
Essential Student Materials:Â
- None.
- None.
Examples of Primary Texts and References
Author | Title | Publisher | Date/Edition | ISBN |
---|---|---|---|---|
Walker, Matt. "CEH Certified Ethical Hacker Boxed Set." Edition 3. McGraw-Hill USA, 2017. |
Examples of Supporting Texts and References
Author | Title | Publisher |
---|---|---|
Sean-Philip Oriyano "Hacker Techniques, Tools, and Incident Handling." Second Edition. Jones and Bartlett Learning LLC, an Ascent Learning Company, 2017 |
Learning Outcomes and Objectives
Course Objectives
- Explore ethical hacking basics
- Explore cryptography
- Investigate reconnaissance: Information gathering for the ethical hacker
- Explore scanning and enumeration
- Explore hacking through the network: Sniffers and evasion
- Investigate how to attack a computer system
- Explore low tech hacking techniques
- Investigate web-based hacking
- Explore wireless network hacking
- Investigate trojans and other attacks
- Perform penetration testing
CSLOs
- Demonstrate the ability to attack and defend a network.
Outline
- Explore ethical hacking basics
- Introduction to Ethical Hacking
- Legal hacking: Laws and guidelines
- Explore cryptography
- Cryptography and encryption overview
- PKI, the digital certificate, and digital signatures
- Encrypted communication and cryptography attacks
- Investigate reconnaissance: Information gathering for the ethical hacker
- Vulnerability research
- Footprinting
- Explore scanning and enumeration
- Scanning for targets
- Enumeration
- Explore hacking through the network: Sniffers and evasion
- Sniffing
- Network roadblocks
- Intrusion detection
- Firewall and honeypots
- Investigate how to attack a computer system
- Windows system hacking
- Linux hacking
- Explore low tech hacking techniques
- Social engineering
- Physical security
- Investigate web-based hacking
- Attacking web servers
- Attacking web applications
- Explore wireless network hacking
- Wireless Concepts
- Network architecture and standards
- Finding and identifying wireless networks
- Wireless hacking
- Wireless attacks
- Bluetooth attacks
- Wireless Concepts
- Investigate trojans and other attacks
- Trojans, backdoors, viruses, and worm attacks
- Denial of service attacks
- Session hijacking
- Perform penetration testing
- Methodology and Steps
- The security assessments
- Security assessment deliverables
- Information Gathering and Analysis
- Methodology and Steps
Lab Topics
- Use Metasploit to take over a Windows computer.
- Steal passwords with a packet sniffer
- Use whois command
- Utilize port scan software and firewalls
- Analyze types of port scans
- Use software keylogger to hack computer passwords
- Crack Windows passwords with Ophcrack
- Perform a Denial of Service attack with Nmap
- Utilize the Nessus vulnerability scanner