Apr 28, 2024  
Course/Program Inventory 
    
Course/Program Inventory

CIT 5030 - Network Penetration Foundations



Clock Hours: 216

Prerequisites:

Completion of the Information Technology Systems Support Specialist Diploma class competencies

Industry Certifications This class fully maps to the CompTIA PenTest+ (PT0-002) exam objectives. 

Course Description:

This course will introduce students to the knowledge and technologies needed to plan and perform network penetration tests and other security engagements in order to understand cybersecurity from an offensive perspective. It is designed to prepare student security analysts, threat intelligence analysts, and incident response handlers to plan engagements, perform reconnaissance to find vulnerabilities in a target organization, exploit vulnerable targets, and create follow-up reports.

Student Learning Outcomes:

Upon successful completion of this class, and obtaining Mastery Level of assessment with the objectives and skills, the student is expected to be able to:

 

  1. Compare and contrast governance, risk, and compliance concepts related to network penetration tests (A)
  2. Explain the importance of scoping and organizational/customer requirements for network performing penetration tests (A)
  3. Given a scenario, demonstrate an ethical hacking mindset by maintaining professionalism and integrity (A)
  4. Given a scenario, perform passive reconnaissance (B)
  5. Given a scenario, perform active reconnaissance (B)
  6. Given a scenario, analyze the results of a reconnaissance exercise (B)
  7. Given a scenario, perform vulnerability scanning (B)
  8. Given a scenario, research attack vectors and perform network attacks (C)
  9. Given a scenario, research attack vectors and perform wireless attacks (C)
  10. Given a scenario, research attack vectors and perform attacks on cloud technologies (C)
  11. Explain common attacks and vulnerabilities against specialized systems (C)
  12. Given a scenario, perform a social engineering or physical attack (C)
  13. Given a scenario, perform post-exploitation techniques (C)
  14. Compare and contrast important components of written reports (D)
  15. Given a scenario, analyze the findings and recommend the appropriate remediation within a report (D)
  16. Explain the importance of communication during the penetration testing process (D)
  17. Explain post-report delivery activities (D)
  18. Explain the basic concepts of scripting and software development (E)
  19. Given a scenario, analyze a script or code sample for use in a penetration test (E)
  20. Explain use cases of common penetration testing tools used during the phases of a penetration test (E)