{"id":2801,"date":"2016-05-23T21:44:09","date_gmt":"2016-05-24T01:44:09","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5202online2016\/?page_id=2801"},"modified":"2016-08-03T18:04:28","modified_gmt":"2016-08-03T22:04:28","slug":"project-2","status":"publish","type":"page","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/project-2\/","title":{"rendered":"Quizzes &amp; Tests"},"content":{"rendered":"<p><strong>Exams<\/strong><\/p>\n<p>There will be both a midterm exam final exam for this course.\u00a0 Both exams will be comprised of short-answer and\/or longer open-ended questions.\u00a0 Check the schedule for dates.<\/p>\n<p>&nbsp;<\/p>\n<p>A missed exam can only be made up in the case of documented and verifiable extreme emergency situations.<\/p>\n<p><strong>Schedule<\/strong><\/p>\n<table style=\"width: 740px\">\n<tbody>\n<tr style=\"height: 56px\">\n<td style=\"width: 99px;height: 56px\">Week<\/td>\n<td style=\"width: 375px;height: 56px\">Topic<\/td>\n<td style=\"width: 250px;height: 56px\">Assignments<\/td>\n<\/tr>\n<tr style=\"height: 68px\">\n<td style=\"width: 99px;height: 68px\">1<\/p>\n<p>Full<\/td>\n<td style=\"width: 375px;height: 68px\">Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process.<\/td>\n<td style=\"width: 250px;height: 68px\"><\/td>\n<\/tr>\n<tr style=\"height: 77px\">\n<td style=\"width: 99px;height: 77px\">2<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 77px\">TCP\/IP and Network Architecture and its impact on the process of hacking.<\/p>\n<p>Google Hacking<\/td>\n<td style=\"width: 250px;height: 77px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 200px\">\n<td style=\"width: 99px;height: 200px\">3<\/p>\n<p>Full<\/td>\n<td style=\"width: 375px;height: 200px\">Reconnaissance \u2013 Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems.<\/td>\n<td style=\"width: 250px;height: 200px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 168px\">\n<td style=\"width: 99px;height: 168px\">4<\/p>\n<p>Full<\/td>\n<td style=\"width: 375px;height: 168px\">Vulnerability scanning and analysis of results<\/p>\n<p>Assignment presentation<\/td>\n<td style=\"width: 250px;height: 168px\">Quiz<\/p>\n<p>Reconnaissance exercise using only publicly available information, develop a profile of a public company or organization of your choosing.<\/td>\n<\/tr>\n<tr style=\"height: 168px\">\n<td style=\"width: 99px;height: 168px\">5<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 168px\">System and User enumeration<\/p>\n<p>Assignment presentation<\/td>\n<td style=\"width: 250px;height: 168px\">Quiz<\/p>\n<p>Scanning exercise targeted against only systems you personally own, develop a profile of the targeted machine or machines.<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 99px;height: 96px\">6<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 96px\">Sniffers<\/td>\n<td style=\"width: 250px;height: 96px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 99px;height: 96px\">7<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 96px\">NetCat<\/p>\n<p>Hellcat<\/td>\n<td style=\"width: 250px;height: 96px\">Exam<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 99px;height: 96px\">8<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 96px\">Social Engineering, Encoding, and Encryption<\/td>\n<td style=\"width: 250px;height: 96px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 104px\">\n<td style=\"width: 99px;height: 104px\">9<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 104px\">Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware<\/td>\n<td style=\"width: 250px;height: 104px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 99px;height: 96px\">10<\/p>\n<p>Full<\/td>\n<td style=\"width: 375px;height: 96px\">Web application hacking, Intercepting Proxies, and URL Editing<\/td>\n<td style=\"width: 250px;height: 96px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 192px\">\n<td style=\"width: 99px;height: 192px\">11<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 192px\">SQL injection<\/p>\n<p>Assignment presentation<\/td>\n<td style=\"width: 250px;height: 192px\">Quiz<\/p>\n<p>Intercepting Proxy exercise targeted against a public website of your choice.\u00a0 Only normal website activity is to be profiled.\u00a0 <strong>Under no circumstances shall injection techniques be used.<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 99px;height: 96px\">12<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 96px\">Web Services<\/td>\n<td style=\"width: 250px;height: 96px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 99px;height: 96px\">13<\/p>\n<p>1 hr<\/td>\n<td style=\"width: 375px;height: 96px\">Evasion Techniques<\/td>\n<td style=\"width: 250px;height: 96px\">Quiz<\/td>\n<\/tr>\n<tr style=\"height: 96px\">\n<td style=\"width: 99px;height: 96px\">14<\/p>\n<p>Full<\/td>\n<td style=\"width: 375px;height: 96px\">Review of all topics and wrap up discussion<\/td>\n<td style=\"width: 250px;height: 96px\">Exam<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Exams There will be both a midterm exam final exam for this course.\u00a0 Both exams will be comprised of short-answer and\/or longer open-ended questions.\u00a0 Check the schedule for dates. &nbsp; A missed exam can only be made up in the case of documented and verifiable extreme emergency situations. Schedule Week Topic Assignments 1 Full Overview [&hellip;]<\/p>\n","protected":false},"author":10110,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"class_list":{"0":"post-2801","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/pages\/2801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/10110"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=2801"}],"version-history":[{"count":4,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/pages\/2801\/revisions"}],"predecessor-version":[{"id":3144,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/pages\/2801\/revisions\/3144"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=2801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}