This course exposes students to the world of ethical computer hacking by discussing foundational concepts, frameworks, and theoretical knowledge that will provide a richer understanding of how and why vulnerable hosts/systems are attacked to motivate and better apply defensive tactics, techniques, and procedures (TTP’s). The class looks at fundamental hacking approaches through practical exposure via hands-on assignments, discussions and a quiz. For lab assignments, students are expected to use a computer that will remain air-gapped/off all networks while they complete the deliverable. The course goal is to learn fundamental principles of reconnaissance, scanning, escalation, pivoting, and exploitation that can be leveraged to defend computing infrastructures and systems. Students will primarily use virtual machines in labs to install Kali Linux Tools to include; Lynis, Metasploit Framework, Nmap, SET, WebScarab, Sqlmap, Nessus, John the Ripper, Hydra, Browser Exploitation Framework (BeEF), and Aircrack-ng to provide hands-on experience with Ethical Hacking.
EN.695.601 Foundations of Information Assurance and one of EN.635.611 Principles of Network Engineering or EN.605.671 Principles of Data Communications Networks. Course Note(s): Homework assignments will include programming.
Introduction to Ethical Hacking
05/31/2022 - 08/23/2022