|
Jan 15, 2025
|
|
|
|
CIS 450 - Penetration Testing5 Credits Students begin by reviewing the five fundamentals: information gathering, scanning, enumeration, exploitation and reporting. They will examine actual exploitation techniques and the business practices needed to prevent the same. The course focuses on the penetration testing of large network infrastructures with layer 2 and layer 3 attacks. Students will use basic and advanced tools to examine packets and network traffic. Students will be exposed to service provider level attacks, including VPN and SSL attacks, and learn how to detect/defend against them. Students are introduced to creating a pen testing lab.
Pre-requisite(s) CIS 370 and CIS 420 w/ min. 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF
Quarters Typically Offered Winter Evening Spring Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20230320T11:43:48
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Define Penetration Testing
- Laws and relevant regulations
- Business Practices and Policies
- Common tooling and methodologies for:
- Information Gathering
- Scanning
- Enumeration
- Exploitation
- Reporting
- Hardening and Testing Systems
- Exploits and Payloads
- Service Provider Attacks
- Packet Capture and Analysis
- Layer 2 Attacks
- Layer 3 Attacks
- Attacks on Cisco Infrastructure
- VPN Attacks
- Exploiting Certificates and Trust on Networks
- Testing IDS and IPS Systems
- Penetration Testing of Cloud Based Deployments
- Hardening and Retesting Systems
- Reporting to the Client / Management
Student Learning Outcomes Explain the relevant laws, governance, and compliance regulations concerning penetration testing
Design and apply technical and administrative standards, practices, and policies to secure network hosts
Explain the use cases, quantitative outcomes, and industry fundamentals of penetration testing
Effectively harden and test the security state of systems using standard tools
Research and report on cyber security threat actors such as advanced persistent threats
Analyze network traffic to identify malicious activity
Generate penetration testing reports that explain how penetration testing techniques affect the related security layers to computing systems
Add to Portfolio (opens a new window)
|
|