Syllabus for CYB-320

ETHICAL HACKING


COURSE DESCRIPTION

Ethical Hacking is designed to provide students with an understanding of the approach hackers take in compromising a system. This approach is the same for criminal hackers as it is for ethical hackers, also known as penetration testers. The course examines hacking tools and techniques used by security professionals and ethical hackers to protect an organization’s systems and data. It includes topics such as attack vectors, honeypots, penetration testing, and security baseline analyzers.

COURSE TOPICS

COURSE OBJECTIVES

After completing this course, students should be able to:

CO1        Process the activities related to each hacking phase.

CO2        Employ hacking tools to conduct reconnaissance.

CO3        Investigate the security posture of system using ethical hacking.

CO4        Compare and contrast the types of hackers.

CO5        Determine the appropriate tools to use in the appropriate phases.

COURSE MATERIALS

You will need the following materials to complete your coursework. Some course materials may be free, open source, or available from other providers. You can access free or open-source materials by clicking the links provided below or in the module details documents. To purchase course materials, please visit the University's textbook supplier.

Required Textbook

Link to Packt Publishing

ISBN: 978-1788622059

COURSE STRUCTURE

Ethical Hacking is a three-credit, online course consisting of six modules with six discussion forums, two written assignments, twelve InfoSec labs, three quizzes, and a final project. Modules include an overview, topics, learning objectives, study materials, and activities. Module titles are listed below.

ASSESSMENT METHODS

For your formal work in the course, you are required to participate in online discussion forums, complete written assignments, complete Infosec learning labs, take quizzes, and complete a final project. See below for details.

Consult the Course Calendar for due dates.

Promoting Originality

One or more of your course activities may utilize a tool designed to promote original work and evaluate your submissions for plagiarism. More information about this tool is available in About SafeAssign.

Discussion Forums

You are required to complete six discussion forums. The written assignments are on a variety of topics associated with the course modules.

Written Assignments

You are required to complete two written assignments. The written assignments are on a variety of topics associated with the course modules.

InfoSec Labs

You are required to complete and submit results for twelve Infosec Learning Labs for this course. Each lab is either 90 minutes or 120 minutes in duration, regulated by a timer. They are designed to be completed in one sitting to simulate a real experience, so you cannot save your progress to return later. For an optimal experience, use a Chrome web browser with an Internet connection to run the labs. While completing each lab, take a screenshot of the performance report screen. Submit both the screenshot and your lab reflection to your mentor using the appropriate “Infosec Lab Results” link in Moodle. Your mentor will review your submissions and give you credit for each completed activity. Be sure to reference the Course Calendar for due dates.

Please see the Infosec Learning Labs section of the course website for further details and instructions.

Quizzes

You are required to complete three quizzes. The quizzes are on a variety of topics associated with the course modules. Quizzes are open-book and unproctored, and they will help you review basic terminology and concepts. All quiz questions are multiple choice. There is no time limit for taking each quiz.

You are encouraged to take the quizzes multiple times for additional practice. You will see some different questions each time. The gradebook will record your most recent score.

Each quiz will cover material in two modules, and you will take it during the latter module.

Final Project

You will demonstrate an understanding of ethical hacking tools and how to apply those in one of the hacking phases.

GRADING AND EVALUATION

Your grade in the course will be determined as follows:

All activities will receive a numerical grade of 0–100. You will receive a score of 0 for any work not submitted. Your final grade in the course will be a letter grade. Letter grade equivalents for numerical grades are as follows:

A

=

93–100

C+

=

78–79

A–

=

90–92

C

=

73–77

B+

=

88–89

C–

=

70–72

B

=

83–87

D

=

60–69

B–

=

80–82

F

=

Below 60

STRATEGIES FOR SUCCESS

First Steps to Success

To succeed in this course, take the following first steps:

Study Tips

Consider the following study tips for success:

ACADEMIC POLICIES

To ensure success in all your academic endeavors and coursework at Thomas Edison State University, familiarize yourself with all administrative and academic policies including those related to academic integrity, course late submissions, course extensions, and grading policies.

For more, see:

Copyright © 2019 by Thomas Edison State University. All rights reserved.