Jul 11, 2025  
2021-22 Catalog 
    
2021-22 Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CIS 460 - Penetration Testing II

5 Credits
This course is the capstone course for the BAS in CyberSecurity and Forensics and the second course in the Pen Testing certificate. Students use  labs to explore penetration testing techniques  and perform incident response.  The students will gather and utilize use threat intel to identify indicators of compromise, tactics, techniques, and procedures.  The environment will include Windows and Linux operating systems, DBMS, Hadoop, cloud servers, mobile devices, sensitive data and other topics covered in the prior courses. Students will be expected to explain and demonstrate their processes and reporting.  

Pre-requisite(s) CIS 450 with min 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered
Summer Evening
Spring Evening

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20210403T10:07:59

Grading System Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  • Objectives of Pen Testing
    • Types
    • Laws
    • Permissions
  • Legal Considerations
    • Regulations
    • Sensitive data
  • Web Vulnerabilities
  • Internal Pen Testing
  • External Pen Testing
  • Virtual Pen Testing
  • Web Pen Testing
  • Software tools
  • Mobile devices
  • Building a Pen Testing Lab
  • Pen Test Framework
    • Open Source Security Testing Methodology Manual (OSSTMM)
    • Creating a checklist
  • Exploits and current events
  • Reports and Professionalism


Student Learning Outcomes
Describe and report the objectives of Pen Testing

Explain and articulate the various scopes of pen testing and the relationship with applicable laws and organizational policies.

Evaluate Web vulnerabilities associated with applications and services.

Explain the various security frameworks.

Demonstrate how existing and new exploits may alter pen test designs or outcomes.

Create professional reports following penetration tests.

Perform incident response and utilize the lessons learned to discuss and demonstrate security improvements and system hardening.



Add to Portfolio (opens a new window)