Course Description and Objectives:
This course focuses on tools and techniques involved in real-world cyber operations. It provides a
broad range of cybersecurity concepts and essential hands-on training for students who want to
become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline
the model computing environment, and practice different tools and strategies to perform cyber
attacks and defense operations.
After completing this course, students will be able to:
• understand the rules and laws involved in real-world cyber operations,
• understand the basic components of the model computing networks, and take different
techniques to identify and trace the network traffic if an instruction is detected inside a
network,
• identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network from possible attacks,
• understand how to plan, organize and perform penetration testing on a network,
• understand different cryptographic protocols, tools, and mechanisms used for different
systems, and exploit their weaknesses accordingly,
• manage data and personal information in a secure manner
Module 0. Linux Basic
• Introduce the basic Linux operation system
Module 1. Traffic Tracing and Analysis
• Introduce the basic computer network concepts
• Use Wireshark/tshark to trace the network traffic
Module 2. Sword vs. Shield
• Setup pfSense Firewall
• Use NMAP to find vulnerabilities
Module 3. Penetration Test
• Introduce Metasploit Framework
• Enumerate system vulnerabilities and launch attacks on different attack vectors.
Module 4. Password Cracking
• Understand how passwords are stored in different systems
• Practice different tools to crack passwords
Module 5. Wireless Security
• Understand the vulnerabilities of the current Wi-Fi networks
• Practice different tools to crack and decrypt the Wi-Fi traffic
Module 6. Digital Steganography
• Understand the technical details of digital steganography.
• Use s-tool/steghide to perform digital steganography
Course Schedule:
Please note that all students must follow the following course timeline, regardless of whether
you are registered for the sync or async online sessions.
L: Lecture, H: Hands-on
Week Topics Type
1 Module 0 – Course Introduction and Basic Linux Commands L&H
2/3/4 Module 1 – Introduction to Computer network L
5 Module 1 – Traffic Tracing and Analysis H
6 Module 2 – Network Scanning L&H
7 Module 2 – pfSense Firewall L&H
8 Module 3 – Introduction to Ethical Hacking L
9/10 Module 3 – Penetration Testing L&H
11 Module 4 – Password Cracking H
12 Module 5 – Wi-Fi Password Cracking L
13 Module 6– Digital Steganography L&H
14 Module X – extra module H
15 Review Sessions