ITSY-2330 Intrusion Detection: Ethical Hacking
James Wade
Credit Spring 2024
Section(s)
ITSY-2330-001 (76409)
LEC MW 7:35pm - 8:55pm DIL DLS DIL
LAB MW 8:55pm - 9:20pm DIL DLS DIL
Course Requirements
Basis for Grades
|
Type |
Number |
Percent Each |
Total Weight |
|
Lecture Exam |
2 Exams |
15% |
30% |
|
Chapter Quiz |
13 Chapter Quiz |
2.3% |
30% |
|
Labs |
15 Labs |
2% |
30% |
|
Attendance |
|
10% |
10% |
|
|
|
Total |
100% |
Chapter Quizzes
13 in number, over textbook chapters & instructor quizzes
2.3% of your grade, total weight 30%
Open book.
Labs
15 in number
2% of your grade, total weight 30%
Virtual OnLine
Online Participation
Total weight 10%
Since this is an Online Course; your participation online will count towards 10% of your grade. Participation means attending Webex Sessions, answering & asking questions, participating in forums, and submitting work on-time.
Lecture Exams
2 in number
Total weight 30%
T/F, multiple choices
Will cover specific chapters and appendices (see schedule)
Lock Down Browser
Readings
All Course Readings will follow the following schedule:
ITSY 2330 Class Schedule Ver 3 | |||||||
Spring 2024 | |||||||
Tentative schedule subject to change | Holidays: Spring Break | ||||||
Wk. | Cl. | Day | Date | Lecture | Readings | Lab | Due |
1 | 1 | W | 17-Jan | Introduction Syllabus Networking Intro |
Syllabus | ||
2 | 2 | M | 22-Jan | Ethical Hacking Overview | Module 1 | ||
2 | 3 | W | 24-Jan | Security Lab 1 | Quiz 1 | ||
3 | 4 | M | 29-Jan | TCP/IP Concepts Review | Module 2 | ||
3 | 5 | W | 31-Jan | Security Lab 2 | Quiz 2 | ||
4 | 6 | M | 5-Feb | Network and Computer Attacks | Module 3 | ||
4 | 7 | W | 7-Feb | Security Lab 3 | Quiz 3 | ||
5 | 8 | M | 12-Feb | Footprinting and Social Engineering | Module 4 | ||
5 | 9 | W | 14-Feb | Security Lab 4 | Quiz 4 | ||
6 | 10 | M | 19-Feb | Port Scanning | Module 5 | ||
6 | 11 | W | 21-Feb | Security Lab 5 | Quiz 5 | ||
7 | 12 | M | 26-Feb | Enumeration | Module 6 | ||
7 | 13 | W | 28-Feb | Security Lab 6 | Quiz 6 | ||
8 | 14 | M | 4-Mar | Programming for Security Professionals | Module 7 | ||
8 | 15 | W | 6-Mar | Security Lab 7 | Quiz 7 | ||
M | 11-Mar | SPRING BREAK NO CLASS |
|||||
W | 13-Mar | ||||||
9 | 16 | M | 18-Mar | Desktop and Server OS Vulnerabilities | Module 8 | Mid-Term Exam 1 Due |
|
9 | 17 | W | 20-Mar | Security Lab 8 | Quiz 8 | ||
10 | 18 | M | 25-Mar | Embedded Operating Systems: The Hidden Threat |
Module 9 | ||
10 | 19 | W | 27-Mar | Security Lab 9 | Quiz 9 | ||
11 | 20 | M | 1-Apr | Hacking Web Servers | Module 10 | ||
11 | 21 | W | 3-Apr | Security Lab 10 | Quiz 10 | ||
12 | 22 | M | 8-Apr | Hacking Wireless Networks | Module 11 | ||
12 | 23 | W | 10-Apr | Security Lab 11 | Quiz 11 | ||
13 | 24 | M | 15-Apr | Cryptography | Module 12 | ||
13 | 25 | W | 17-Apr | Security Lab 12 | Quiz 12 | ||
14 | 26 | M | 22-Apr | Network Protection Systems | Module 13 | ||
14 | 27 | W | 24-Apr | Security Lab 13 | Quiz 13 | ||
15 | 28 | M | 29-Apr | Ethical Hacking Projects | Module 14 | ||
15 | 29 | W | 1-May | Security Lab 14 & Lab 15 | |||
16 | 30 | M | 6-May | Security Lecture | WebSites | ||
16 | 31 | W | 8-May | Final | EXAM 2 DUE |
Course Subjects
The Lectures and Lecture titles follow the following schedule:
ITSY 2330 Class Schedule Ver 3 | |||||||
Spring 2024 | |||||||
Tentative schedule subject to change | Holidays: Spring Break | ||||||
Wk. | Cl. | Day | Date | Lecture | Readings | Lab | Due |
1 | 1 | W | 17-Jan | Introduction Syllabus Networking Intro |
Syllabus | ||
2 | 2 | M | 22-Jan | Ethical Hacking Overview | Module 1 | ||
2 | 3 | W | 24-Jan | Security Lab 1 | Quiz 1 | ||
3 | 4 | M | 29-Jan | TCP/IP Concepts Review | Module 2 | ||
3 | 5 | W | 31-Jan | Security Lab 2 | Quiz 2 | ||
4 | 6 | M | 5-Feb | Network and Computer Attacks | Module 3 | ||
4 | 7 | W | 7-Feb | Security Lab 3 | Quiz 3 | ||
5 | 8 | M | 12-Feb | Footprinting and Social Engineering | Module 4 | ||
5 | 9 | W | 14-Feb | Security Lab 4 | Quiz 4 | ||
6 | 10 | M | 19-Feb | Port Scanning | Module 5 | ||
6 | 11 | W | 21-Feb | Security Lab 5 | Quiz 5 | ||
7 | 12 | M | 26-Feb | Enumeration | Module 6 | ||
7 | 13 | W | 28-Feb | Security Lab 6 | Quiz 6 | ||
8 | 14 | M | 4-Mar | Programming for Security Professionals | Module 7 | ||
8 | 15 | W | 6-Mar | Security Lab 7 | Quiz 7 | ||
M | 11-Mar | SPRING BREAK NO CLASS |
|||||
W | 13-Mar | ||||||
9 | 16 | M | 18-Mar | Desktop and Server OS Vulnerabilities | Module 8 | Mid-Term Exam 1 Due |
|
9 | 17 | W | 20-Mar | Security Lab 8 | Quiz 8 | ||
10 | 18 | M | 25-Mar | Embedded Operating Systems: The Hidden Threat |
Module 9 | ||
10 | 19 | W | 27-Mar | Security Lab 9 | Quiz 9 | ||
11 | 20 | M | 1-Apr | Hacking Web Servers | Module 10 | ||
11 | 21 | W | 3-Apr | Security Lab 10 | Quiz 10 | ||
12 | 22 | M | 8-Apr | Hacking Wireless Networks | Module 11 | ||
12 | 23 | W | 10-Apr | Security Lab 11 | Quiz 11 | ||
13 | 24 | M | 15-Apr | Cryptography | Module 12 | ||
13 | 25 | W | 17-Apr | Security Lab 12 | Quiz 12 | ||
14 | 26 | M | 22-Apr | Network Protection Systems | Module 13 | ||
14 | 27 | W | 24-Apr | Security Lab 13 | Quiz 13 | ||
15 | 28 | M | 29-Apr | Ethical Hacking Projects | Module 14 | ||
15 | 29 | W | 1-May | Security Lab 14 & Lab 15 | |||
16 | 30 | M | 6-May | Security Lecture | WebSites | ||
16 | 31 | W | 8-May | Final | EXAM 2 DUE |
Student Learning Outcomes/Learning Objectives
Course Rationale
To introduce students to a broad range of network intrusion, prevention and detection topics including: implementation and testing of IDS security plan, security monitoring, intrusion detection, alarm management, analysis of events and trends, and crisis management.
Course Objectives and Learning Outcomes
- Determine which network systems are alive (reconnaissance)
- Discover which operating system software is used on a network, which patches have not been updated, etc. (enumeration)
- Identify which TCP and UDP services are running, listening, or established on the network (port scan)
- Create IDS sensors and attach them to network (snort)
- Detect, identify, resolve and document network intrusions
- Detect privilege escalation, remote control, keyloggers, rootkits, etc.
- Discover rouge wireless access points, sniffers, or VPNs on network
- Monitor and evaluate audit logs and set administrative alerts
- Deploy, implement and test IDS security plan
Office Hours
M T W Th F 4:00 PM - 6:00 PM Webex Online
NOTE Please make use of lab days, forums, and email for questions. Since I teach mostly Online, students should schedule a Webex meeting with me during my Office Hours.Published: 02/19/2024 09:14:22