Syllabus for CYB-320
Ethical Hacking is designed to provide the skills and knowledge needed to secure organizational information assets from cyberattacks in a proactive manner. The course examines hacking tools and techniques used by security professionals and ethical hackers to protect computer networks. It includes topics such as attack vectors, intrusion detection, honeypots, penetration testing, cryptography and steganography, user rights and privileges, security baseline analyzers, physical security, and operational security.
After completing this course, you should be able to:
CO1 Differentiate between ethical and unethical testing.
CO2 Distinguish between network and system cyberattacks and cyberattacks from vulnerabilities.
CO3 Differentiate various types of malware and cryptography.
CO4 Apply various tools to conduct network penetration testing.
CO5 Apply various tools and techniques to hack a Wi-Fi network.
CO6 Examine cloud and mobile device security.
CO7 Apply tools and countermeasures to protect against, prevent, and mitigate cyberattacks and vulnerabilities.
You will need the following materials to do the work of the course. The following uCertify course will serve as your virtual textbook for the course:
Note about Infosec Learning Labs: In completing your coursework, you will be using Infosec Learning Labs, a virtual platform that contains interactive labs, which provide you with a real-world application and hands-on learning experience to practice various cybersecurity skills and concepts.
To access the labs, visit the Infosec section of the course website. When you click the Infosec Learning Labs link in your course for the first time, you will be redirected to an account setup page. You will be asked for some basic information to create your account and then make a payment. The price covers all labs needed for this course and access for six months.
For several assignments throughout the course, you will be required to conduct your own academic research to assist in transitioning the theory and concepts. You can access academic journals through the myEdison portal under the Educational tab in the My Resources block.
You will need a library card to access the NJ State Library, which is free for TESU students. Be sure to apply early in the semester, as it may take several weeks to receive your card.
You may find these journals, resources, and conferences to be helpful:
Ethical Hacking is a three-credit, online course consisting of six modules with 6 discussion forums, 2 written assignments, 3 lab exercises, 5 Infosec Learning labs, 19 uCertify quizzes, and a final exam. Modules include an overview, topics, learning objectives, study materials, and activities. Module titles are listed below.
For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, and take a proctored final examination. See below for details.
Consult the Course Calendar for due dates.
In completing your coursework, you will be using parts of the uCertify course Pearson Certified Ethical Hacker (V9) as an interactive textbook. Access to the uCertify course is through the uCertify course: Certified Ethical Hacker (V9) link located in the top section of the CYB-320 course website.
In addition to studying one or more chapters each week, you are required to submit the results of chapter quizzes to your mentor.
Each uCertify chapter includes a chapter quiz. Access the quiz by going to the uCertify Table of Contents and selecting “Quizzes” for that chapter. To receive credit for the quiz, you must score 100% on the quiz when taken in Test mode. You may initially take the quiz in Learn or Review mode, but to receive credit for this activity, you must ultimately score 100% on the quiz when taken in Test mode.
Chapter quizzes are formative activities. You may take them as many times as necessary. At the end of the test, once you have achieved a score of 100%, share your results by downloading the PDF file and submitting it to the mentor using the appropriate assignment link in Moodle.
Note: While the uCertify chapter exercises are not required for this course, completing them will provide you with further practice and will help you prepare for the final exam.
You are required to participate in six discussion forums. The discussion forums are designed to encourage you to discuss the module topics with your classmates. In order to successfully complete the discussion forums, you need to address all items included in the forum, reply to peers thoughtfully, add value to the discussion, and apply ideas, insights, or concepts from scholarly sources, assigned readings, lectures, course materials, or other relevant sources. Replies such as “Good post” or “I agree” will not count toward your grade; your post should add value to the class.
You are required to complete two written assignments. The written assignments are on a variety of topics associated with the course modules. Some of the written assignments will require you to use academic papers from respected peer-reviewed journals or conferences on the topics. (See the list of helpful journals, conferences, and other resources in the Syllabus.)
Each paper should be at least 1250 to 1500 words (5 pages) in length and in APA format (double-spaced with 12-point font and 1-inch margins). You should provide at least two citations in each response.
You are required to complete three lab exercises. Each lab exercise is designed to help you practice the tools and techniques discussed in the corresponding modules.
Infosec Learning Labs
You are required to complete and submit results for five Infosec labs for this course. Each lab is either 90 minutes or 120 minutes in duration, regulated by a timer. They are designed to be completed in one sitting to simulate a real experience, so you cannot save your progress to return later. For an optimal experience, use a Chrome web browser with an Internet connection to run the labs. While completing each lab, take a screenshot toward the end. Submit both the screenshot and your lab reflection to your mentor using the appropriate “Infosec Lab Results” link in Moodle. Your mentor will review your submissions and give you credit for each completed activity. Be sure to reference the Course Calendar for due dates.
Please see the Infosec Learning Labs section of the course website for further details and instructions.
For the final, you are required to use the University's Online Proctor Service (OPS). Please refer to the Examinations and Proctors section of the Online Student Handbook (see General Information area of the course website) for further information about scheduling and taking online exams and for all exam policies and procedures. You are strongly advised to schedule your exam within the first week of the semester.
For a list of key concepts that may appear on your exam, refer to the study guide available in the Examinations section of the course website.
The final exam consists of multiple choice questions and covers material from Modules 1 through 6. The exam is 90 minutes long and is closed-book.
Online exams are administered through the course website. Consult the Course Calendar for the official dates of the exam week.
You are on your honor not to cheat during the exam. Cheating means:
If there is evidence that you have cheated or plagiarized in your exam, the exam will be declared invalid, and you will fail the course.
Your grade in the course will be determined as follows:
All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:
To receive credit for the course, you must earn a letter grade of C or better (for an area of study course) or D or better (for a course not in your area of study), based on the weighted average of all assigned course work (e.g., exams, assignments, discussion postings).
To succeed in this course, take the following first steps:
Consider the following study tips for success:
Thomas Edison State University is committed to maintaining academic quality, excellence, and honesty. The University expects all members of its community to share the commitment to academic integrity, an essential component of a quality academic experience.
Students at Thomas Edison State University are expected to exhibit the highest level of academic citizenship. In particular, students are expected to read and follow all policies, procedures, and program information guidelines contained in publications; pursue their learning goals with honesty and integrity; demonstrate that they are progressing satisfactorily and in a timely fashion by meeting course deadlines and following outlined procedures; observe a code of mutual respect in dealing with mentors, staff, and other students; behave in a manner consistent with the standards and codes of the profession in which they are practicing; keep official records updated regarding changes in name, address, telephone number, or e-mail address; and meet financial obligations in a timely manner. Students not practicing good academic citizenship may be subject to disciplinary action including suspension, dismissal, or financial holds on records.
All members of the University community are responsible for reviewing the Academic Code of Conduct Policy in the University Catalog and online at www.tesu.edu.
Thomas Edison State University expects all of its students to approach their education with academic integrity—the pursuit of scholarly activity free from fraud and deception. All mentors and administrative staff members at the University insist on strict standards of academic honesty in all courses. Academic dishonesty undermines this objective. Academic dishonesty can take the following forms:
Thomas Edison State University is committed to helping students understand the seriousness of plagiarism, which is defined as using the work and ideas of others without proper citation. The University takes a strong stance against plagiarism, and students found to be plagiarizing are subject to discipline under the academic code of conduct policy.
If you copy phrases, sentences, paragraphs, or whole documents word-for-word—or if you paraphrase by changing a word here and there—without identifying the author, or without identifying it as a direct quote, then you are plagiarizing. Please keep in mind that this type of identification applies to Internet sources as well as to print-based sources. Copying and pasting from the Internet, without using quotation marks and without acknowledging sources, constitutes plagiarism. (For information about how to cite Internet sources, see Online Student Handbook > Academic Standards > Citing Sources.)
Accidentally copying the words and ideas of another writer does not excuse the charge of plagiarism. It is easy to jot down notes and ideas from many sources and then write your own paper without knowing which words are your own and which are someone else’s. It is more difficult to keep track of each and every source. However, the conscientious writer who wishes to avoid plagiarizing never fails to keep careful track of sources.
Always be aware that if you write without acknowledging the sources of your ideas, you run the risk of being charged with plagiarism.
Clearly, plagiarism, no matter the degree of intent to deceive, defeats the purpose of education. If you plagiarize deliberately, you are not educating yourself, and you are wasting your time on courses meant to improve your skills. If you plagiarize through carelessness, you are deceiving yourself.
For examples of unintentional plagiarism, advice on when to quote and when to paraphrase, and information about writing assistance and originality report checking, click the links provided below.
Examples of Unintentional Plagiarism
When to Quote and When to Paraphrase
Writing Assistance at Smarthinking
Originality Report Checking at Turnitin
Acts of both intentional and unintentional plagiarism violate the Academic Code of Conduct.
If an incident of plagiarism is an isolated minor oversight or an obvious result of ignorance of proper citation requirements, the mentor may handle the matter as a learning exercise. Appropriate consequences may include the completion of tutorials, assignment rewrites, or any other reasonable learning tool in addition to a lower grade for the assignment or course. The mentor will notify the student and appropriate dean of the consequence by e-mail.
If the plagiarism appears intentional and/or is more than an isolated incident, the mentor will refer the matter to the appropriate dean, who will gather information about the violation(s) from the mentor and student, as necessary. The dean will review the matter and notify the student in writing of the specifics of the charge and the sanction to be imposed.
Possible sanctions include:
Copyright © 2018 by Thomas Edison State University. All rights reserved.