|
Jul 11, 2025
|
|
|
|
CIS 460 - Penetration Testing II 5 Credits This course is the capstone course for the BAS in CyberSecurity and Forensics and the second course in the Pen Testing certificate. Students use labs to explore penetration testing techniques and perform incident response. The students will gather and utilize use threat intel to identify indicators of compromise, tactics, techniques, and procedures. The environment will include Windows and Linux operating systems, DBMS, Hadoop, cloud servers, mobile devices, sensitive data and other topics covered in the prior courses. Students will be expected to explain and demonstrate their processes and reporting.
Pre-requisite(s) CIS 450 with min 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF
Quarters Typically Offered Summer Evening Spring Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20210403T10:07:59
Grading System Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Objectives of Pen Testing
- Legal Considerations
- Regulations
- Sensitive data
- Web Vulnerabilities
- Internal Pen Testing
- External Pen Testing
- Virtual Pen Testing
- Web Pen Testing
- Software tools
- Mobile devices
- Building a Pen Testing Lab
- Pen Test Framework
- Open Source Security Testing Methodology Manual (OSSTMM)
- Creating a checklist
- Exploits and current events
- Reports and Professionalism
Student Learning Outcomes Describe and report the objectives of Pen Testing
Explain and articulate the various scopes of pen testing and the relationship with applicable laws and organizational policies.
Evaluate Web vulnerabilities associated with applications and services.
Explain the various security frameworks.
Demonstrate how existing and new exploits may alter pen test designs or outcomes.
Create professional reports following penetration tests.
Perform incident response and utilize the lessons learned to discuss and demonstrate security improvements and system hardening.
Add to Portfolio (opens a new window)
|
|