Exams
There will be both a midterm exam final exam for this course. Both exams will be comprised of short-answer and/or longer open-ended questions. Check the schedule for dates.
A missed exam can only be made up in the case of documented and verifiable extreme emergency situations.
Schedule
| Week | Topic | Assignments |
| 1
Full |
Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process. | |
| 2
1 hr |
TCP/IP and Network Architecture and its impact on the process of hacking.
Google Hacking |
Quiz |
| 3
Full |
Reconnaissance – Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems. | Quiz |
| 4
Full |
Vulnerability scanning and analysis of results
Assignment presentation |
Quiz
Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing. |
| 5
1 hr |
System and User enumeration
Assignment presentation |
Quiz
Scanning exercise targeted against only systems you personally own, develop a profile of the targeted machine or machines. |
| 6
1 hr |
Sniffers | Quiz |
| 7
1 hr |
NetCat
Hellcat |
Exam |
| 8
1 hr |
Social Engineering, Encoding, and Encryption | Quiz |
| 9
1 hr |
Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware | Quiz |
| 10
Full |
Web application hacking, Intercepting Proxies, and URL Editing | Quiz |
| 11
1 hr |
SQL injection
Assignment presentation |
Quiz
Intercepting Proxy exercise targeted against a public website of your choice. Only normal website activity is to be profiled. Under no circumstances shall injection techniques be used. |
| 12
1 hr |
Web Services | Quiz |
| 13
1 hr |
Evasion Techniques | Quiz |
| 14
Full |
Review of all topics and wrap up discussion | Exam |