Schedule
Session | Topics | Reading | Due |
1 |
Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process. | ||
2 |
Cyber Crime Laws and TCP/IP and Network Architecture and its impact on the process of hacking. |
|
|
3 |
Google Hacking, Reconnaissance – Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems. |
|
|
4 |
Vulnerability scanning and analysis of results, Assignment presentation |
|
Assignment 1 |
5 |
System and User enumeration, Assignment presentation |
|
Assignment 2 |
6 |
Sniffers |
|
|
7 |
Test 1, NetCat |
|
|
8 |
Social Engineering, Encoding, and Encryption |
|
|
9 |
Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware |
| |
10 |
Web application hacking, Intercepting Proxies, and URL Editing |
|
|
11 |
SQL injection, Assignment presentation |
|
Assignment 3 |
12 |
Web Services |
|
|
13 | Evasion Techniques |
|
|
14 |
Test 2 |