Schedule
| Session | Topics | Reading | Due |
| 1 |
Overview of Course, Philosophy of Ethical Hacking and Penetration Testing, and the hacking process. | ||
| 2 |
Cyber Crime Laws and TCP/IP and Network Architecture and its impact on the process of hacking. |
|
|
| 3 |
Google Hacking, Reconnaissance – Concepts of reconnaissance used to obtain basic, high level information about a target organization, often considered information leakage, including but not limited to technical and non-technical public contacts, IP address ranges, document formats, and supported systems. |
|
|
| 4 |
Vulnerability scanning and analysis of results, Assignment presentation |
|
Assignment 1 |
| 5 |
System and User enumeration, Assignment presentation |
|
Assignment 2 |
| 6 |
Sniffers |
|
|
| 7 |
Test 1, NetCat |
|
|
| 8 |
Social Engineering, Encoding, and Encryption |
|
|
| 9 |
Malware including Trojans, Backdoors, Zero-days, Virus, Worms, and Polymorphic malware |
| |
| 10 |
Web application hacking, Intercepting Proxies, and URL Editing |
|
|
| 11 |
SQL injection, Assignment presentation |
|
Assignment 3 |
| 12 |
Web Services |
|
|
| 13 | Evasion Techniques |
|
|
| 14 |
Test 2 |