CYSE 450

Ethical Hacking and Penetration Testing.

This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target systems.

Course Objectives

  • By the end of this course, students will be able to;
  • ·       Recognize the realm of network security.
  • ·       State and relate the basic terminology and concepts in network security.
  • ·       Explain why people attack computers and networks.
  • ·       Define the roles, responsibilities, and common challenges of security personnel to combat hackers successfully.
  • ·       Explain the difference between hacking myths and hacking facts.
  • ·       Explain what a denial-of-service (DoS) attack is
  • ·       Describe the causes of DoS attacks
  • ·       Describe the evolution of programming exploits
  • ·       Recognize Web server vulnerabilities· Describe the steps in the identification of incidents

Assignments

Lab_report

This is a good summary of the labs we completed in class. Each lab took roughly an hour to complete and instructed us how to conduct pentesting on older machines in a controlled VM. Since it was purely labs and testing, there are no real assignments to showcase.