May 04, 2024  
2020-2021 Catalog 
    
2020-2021 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CIS 460 - Penetration Testing II

5 Credits
This course is the capstone course for the BAS in CyberSecurity and Forensics and the second in the Pen Testing certificate. Students will plan, design and create a pen testing lab. Then they will apply the techniques used on ripped from the headlines case scenarios. The environments will include Windows and Linux operating systems, DBMS, Hadoop, cloud servers, mobile devices, sensitive data and other topics covered in the prior courses. Students will be expected to demonstrate their processes, report on and explain the effectiveness of same.

Pre-requisite(s) CIS 450
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered
Summer Evening


Spring Evening

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 2016-02-03

Grading System Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22 Worksite 0 Clinical 0 Other 0
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
I. Objectives of Pen Testing

a. Types

b. Laws

c. Permissions

II. Legal Considerations

a. Regulations

b. Sensitive data

III. Web Vulnerabilities

IV. Internal Pen Testing

V. External Pen Testing

VI. Virtual Pen Testing

VII. Web Pen Testing

VIII. Software tools

IX. Mobile devices

X. Building a Pen Testing Lab

XI. Pen Test Framework

a. Open Source Security Testing Methodology Manual (OSSTMM)

b. Creating a checklist

XII. Exploits and current events

XIII. Reports and Professionalism
 

Student Learning Outcomes
Describe the objectives of Pen Testing

Explain and articulate the types of pen testing that exist along with applicable laws and permissions needed

Evaluate Web vulnerabilities of a company

Perform Internal Pen testing

Perform external Pen testing

Create a virtual pen testing lab

Design and create a physical pen testing lab

Explain the various pen testing frameworks

Demonstrate how new exploits may alter pen test designs or outcomes

Create professional reports as a result of a pen test



Add to Portfolio (opens a new window)