Courses may be offered in one of the following modalities:
If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.
Semester: | Spring 2024 |
Number: | 0145-665-001 |
Instructor: | Sung Kim |
Days: | TBA |
Note: | Online, Asynchronous |
Location: | Online |
Credits: | 3 |
Course Meets: | March 25 - May 16 |
Course Materials: | View Text Books |
Description: |
Students will learn cyber-offensive methods and techniques commonly seen in ethical hacking scenarios and cover topics from reconnaissance and scanning to exploitation, privilege escalation, and pivoting attacks. Specific attention is given to attacking web applications using injection techniques, session management, direct object reference, and information disclosure. |
Learning Goals: |
After completing this course students will be able to:O1: Use network and vulnerability scanning tools to identify potential exposures on a network and formulate hypotheses for attacking themO2: Execute attacks against password-based authentication mechanisms and assess the security of authentication schemesO3: Explain the different criteria used to categorize malware and interpret malware descriptions to create risk assessmentsO4: Use exploit frameworks such as the Metasploit Framework to execute attacks relying on known vulnerabilities in softwareO5: Assess web applications for insecurities and attack vulnerabilities in web applicationsO6: Assess application source code for vulnerabilities, perform black box assessment of programs to find potential application security weaknessesO7: Assess system configuration files to determine risk exposure and interpret system logs to identify signs of compromiseO8: Write scripts supporting security-related activities in the Bash programming Language and in PowershellO9: Participate in Capture-the-Flag activitiesO10: Build and use a public-key infrastructure, and use compromised key material to decrypt intercepted network connections *The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here. |
» View Other Sections of this Course