{"id":344,"date":"2026-04-18T00:22:53","date_gmt":"2026-04-18T00:22:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/?page_id=344"},"modified":"2026-04-18T03:32:33","modified_gmt":"2026-04-18T03:32:33","slug":"cyse-450-ethical-hacking-and-penetration-testing","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cyse-450-ethical-hacking-and-penetration-testing\/","title":{"rendered":"CYSE 450 &#8211; Ethical hacking and penetration testing"},"content":{"rendered":"\n<p>This course introduces the basic terminologies used in ethical hacking and useful tools in<br>relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in<br>various systems and operate the industry-leading tools and framework to perform the<br>penetration testing on different target systems.<\/p>\n\n\n\n<p><strong>Course Learning Outcomes<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>After completing this course, students will be able to:<\/p>\n\n\n\n<ul>\n<li>Understand the basics of ethical hacking<\/li>\n\n\n\n<li>Understand the laws that govern ethical hacking<\/li>\n\n\n\n<li>Perform system hacking<\/li>\n\n\n\n<li>Test and breach web applications and data servers<\/li>\n\n\n\n<li>Write scripts using Bash and Python<\/li>\n\n\n\n<li>Complete a penetration test and report<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Course Materials<\/h2>\n\n\n\n<p>Passive Reconnaissance<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex1ids450.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of ex1ids450.\"><\/object><a id=\"wp-block-file--media-541bc554-91fb-4f8e-b782-990beda551a3\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex1ids450.pdf\">ex1ids450<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex1ids450.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-541bc554-91fb-4f8e-b782-990beda551a3\">Download<\/a><\/div>\n\n\n\n<p>Active Reconnaissance and Vulnerability Scanning<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex2ids450.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of ex2ids450.\"><\/object><a id=\"wp-block-file--media-e8739d70-8b5f-4c48-b0f6-70caeabcd291\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex2ids450.pdf\">ex2ids450<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex2ids450.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e8739d70-8b5f-4c48-b0f6-70caeabcd291\">Download<\/a><\/div>\n\n\n\n<p>Malware Analysis<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex3ids450.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of ex3ids450.\"><\/object><a id=\"wp-block-file--media-6be6df00-b38b-4ccd-a879-6faa01209e38\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex3ids450.pdf\">ex3ids450<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex3ids450.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6be6df00-b38b-4ccd-a879-6faa01209e38\">Download<\/a><\/div>\n\n\n\n<p>SQL Injection<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex4ids450.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of ex4ids450.\"><\/object><a id=\"wp-block-file--media-4ce24488-3fb8-4198-ba11-6d84814c9a63\" href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex4ids450.pdf\">ex4ids450<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/ex4ids450.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4ce24488-3fb8-4198-ba11-6d84814c9a63\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course introduces the basic terminologies used in ethical hacking and useful tools inrelation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities invarious systems and operate the industry-leading tools and framework to perform thepenetration testing on different target systems. Course Learning Outcomes After completing this course, students will be able&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cyse-450-ethical-hacking-and-penetration-testing\/\">Read More<\/a><\/div>\n","protected":false},"author":27592,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/344"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/users\/27592"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/344\/revisions"}],"predecessor-version":[{"id":434,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/344\/revisions\/434"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/media?parent=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}