Directories and Search

Course Search


Courses may be offered in one of the following modalities:

  • Traditional in-person courses (0–29 percent of coursework is delivered online, the majority being offered in person.)
  • Hybrid/blended courses (30–79 percent of coursework is delivered online.)
  • Online courses (100 percent of coursework is delivered online, either synchronously on a designated day and time or asynchronously as a deadline-driven course.)
  • Hyflex (Students will be assigned to attend in-person or live streamed sessions as a reduced-size cohort on a rotating basis; live sessions are also recorded, offering students the option to participate synchronously or view asynchronously as needed.)

If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.


Cybersecurity Techniques (CSC-665)


Semester: Spring 2024
Number: 0145-665-001
Instructor: Sung Kim
Days: TBA
Note: Online, Asynchronous
Location: Online
Credits: 3
Course Meets: March 25 - May 16
Course Materials: View Text Books
Description:

Students will learn cyber-offensive methods and techniques commonly seen in ethical hacking scenarios and cover topics from reconnaissance and scanning to exploitation, privilege escalation, and pivoting attacks. Specific attention is given to attacking web applications using injection techniques, session management, direct object reference, and information disclosure.

Learning Goals:   After completing this course students will be able to:O1: Use network and vulnerability scanning tools to identify potential exposures on a network and formulate hypotheses for attacking themO2: Execute attacks against password-based authentication mechanisms and assess the security of authentication schemesO3: Explain the different criteria used to categorize malware and interpret malware descriptions to create risk assessmentsO4: Use exploit frameworks such as the Metasploit Framework to execute attacks relying on known vulnerabilities in softwareO5: Assess web applications for insecurities and attack vulnerabilities in web applicationsO6: Assess application source code for vulnerabilities, perform black box assessment of programs to find potential application security weaknessesO7: Assess system configuration files to determine risk exposure and interpret system logs to identify signs of compromiseO8: Write scripts supporting security-related activities in the Bash programming Language and in PowershellO9: Participate in Capture-the-Flag activitiesO10: Build and use a public-key infrastructure, and use compromised key material to decrypt intercepted network connections

*The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here.

» View Other Sections of this Course


« Back to Search Results

 
Apply Now
Request Information