• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Quizzes & Tests

Exams

There will be both a midterm exam final exam for this course.  Both exams will be comprised of short-answer and/or longer open-ended questions.  Check the schedule for dates.

 

A missed exam can only be made up in the case of documented and verifiable extreme emergency situations.

Schedule

Week Topic Assignments
1

Full

Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process.
2

1 hr

TCP/IP and Network Architecture and its impact on the process of hacking.

Google Hacking

Quiz
3

Full

Reconnaissance – Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems. Quiz
4

Full

Vulnerability scanning and analysis of results

Assignment presentation

Quiz

Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing.

5

1 hr

System and User enumeration

Assignment presentation

Quiz

Scanning exercise targeted against only systems you personally own, develop a profile of the targeted machine or machines.

6

1 hr

Sniffers Quiz
7

1 hr

NetCat

Hellcat

Exam
8

1 hr

Social Engineering, Encoding, and Encryption Quiz
9

1 hr

Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware Quiz
10

Full

Web application hacking, Intercepting Proxies, and URL Editing Quiz
11

1 hr

SQL injection

Assignment presentation

Quiz

Intercepting Proxy exercise targeted against a public website of your choice.  Only normal website activity is to be profiled.  Under no circumstances shall injection techniques be used.

12

1 hr

Web Services Quiz
13

1 hr

Evasion Techniques Quiz
14

Full

Review of all topics and wrap up discussion Exam

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in