|
Dec 22, 2024
|
|
|
|
CSN 3010 - Cyber Security
Clock Hours: 203
Delivery Mode on-ground
Prerequisites: Completion of 1st and 2nd Trimester
Course Description: This course is designed to educate students about how to move into the cybersecurity field. It covers the five phases of ethical hacking; reconnaissance, scanning, gain access, maintenance access, and cover your tracks; in order to prepare you to create a counter attack.
Student Learning Outcomes:
-
Understand penetration testing to find vulnerabilities and risks with the purpose of securing a computer or network system.
-
Understand the concept of social engineering and methods hackers use to manipulate people to give out information or perform tasks that will give up critical information.
-
Understand how reconnaissance is used as a systematic attempt to locate, gather, identify, and record information about a target.
-
Understand how to identify scanning on a network; the process of actively connecting to a system to get a response and gather information.
-
Understand the enumeration phase, where you will extract and record as much information as you can about a network or system.
-
Understand how to use a vulnerability assessment to identify weaknesses in an organization infrastructure, including the operating system, web applications, and web server.
-
Understand the importance of and how to implement a strong password policy to diminish the possibility of hacking.
-
Understand how to combat various forms of malware.
-
Understand how to utilize tools; such as, sniffing, switched network sniffing, Wireshark, TCPDump, and additional sniffing tools to locate vulnerabilities in your network.
-
Utilize IDS (intrusion detection system) to monitor network traffic for suspicious activity. This included the use of firewalls and honeypots.
-
How to identify and protect networks from web server and web application attacks and SQL injections.
-
How to identify and protect against WiFi, Bluetooth, and Mobile Device attacks.
-
Understand the concept of Cloud Computing and Internet of Things and how to secure and protect them from attacks.
-
Understand the process of cryptography to convert data into secret code during transmission.
|
|