Exams
There will be both a midterm exam final exam for this course. Both exams will be comprised of short-answer and/or longer open-ended questions. Check the schedule for dates.
A missed exam can only be made up in the case of documented and verifiable extreme emergency situations.
Schedule
Week | Topic | Assignments |
1
Full |
Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process. | |
2
1 hr |
TCP/IP and Network Architecture and its impact on the process of hacking.
Google Hacking |
Quiz |
3
Full |
Reconnaissance – Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems. | Quiz |
4
Full |
Vulnerability scanning and analysis of results
Assignment presentation |
Quiz
Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing. |
5
1 hr |
System and User enumeration
Assignment presentation |
Quiz
Scanning exercise targeted against only systems you personally own, develop a profile of the targeted machine or machines. |
6
1 hr |
Sniffers | Quiz |
7
1 hr |
NetCat
Hellcat |
Exam |
8
1 hr |
Social Engineering, Encoding, and Encryption | Quiz |
9
1 hr |
Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware | Quiz |
10
Full |
Web application hacking, Intercepting Proxies, and URL Editing | Quiz |
11
1 hr |
SQL injection
Assignment presentation |
Quiz
Intercepting Proxy exercise targeted against a public website of your choice. Only normal website activity is to be profiled. Under no circumstances shall injection techniques be used. |
12
1 hr |
Web Services | Quiz |
13
1 hr |
Evasion Techniques | Quiz |
14
Full |
Review of all topics and wrap up discussion | Exam |