Apr 23, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 450 - Penetration Testing

5 Credits
Students begin by reviewing the five fundamentals: information gathering, scanning, enumeration, exploitation and reporting. They will examine actual exploitation techniques and the business practices needed to prevent the same. The course focuses on the penetration testing of large network infrastructures with layer 2 and layer 3 attacks. Students will use basic and advanced tools to examine packets and network traffic. Students will be exposed to service provider level attacks, including VPN and SSL attacks, and learn how to detect/defend against them. Students are introduced to creating a pen testing lab. 

Pre-requisite(s) CIS 370 and CIS 420 w/ min. 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered
Winter Evening
Spring Evening

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20230320T11:43:48

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  1. Define Penetration Testing
  2. Laws and relevant regulations
  3. Business Practices and Policies
  4. Common tooling and methodologies for:
    1. Information Gathering
    2. Scanning
    3. Enumeration
    4. Exploitation
    5. Reporting
  5. Hardening and Testing Systems
  6. Exploits and Payloads
  7. Service Provider Attacks
  8. Packet Capture and Analysis
  9. Layer 2 Attacks
  10. Layer 3 Attacks
  11. Attacks on Cisco Infrastructure
  12. VPN Attacks
  13. Exploiting Certificates and Trust on Networks
  14. Testing IDS and IPS Systems
  15. Penetration Testing of Cloud Based Deployments
  16. Hardening and Retesting Systems
  17. Reporting to the Client / Management


Student Learning Outcomes
Explain the relevant laws, governance, and compliance regulations concerning penetration testing

Design and apply technical and administrative standards, practices, and policies to secure network hosts

Explain the use cases, quantitative outcomes, and industry fundamentals of penetration testing

Effectively harden and test the security state of systems using standard tools

Research and report on cyber security threat actors such as advanced persistent threats

Analyze network traffic to identify malicious activity

Generate penetration testing reports that explain how penetration testing techniques affect the related security layers to computing systems



Add to Portfolio (opens a new window)