May 20, 2024  
2023-2024 Course Catalog 
    
2023-2024 Course Catalog [ARCHIVED CATALOG]

Add to Portfolio (opens a new window)

CFI 2086 - Introduction to Ethical Hacking

Credits: 3
Hours/Week: Lecture 2 Lab 2
Internship hours per week 0
Course Description: This course covers the three major phases of penetration testing (reconnaissance, vulnerability analysis, and exploitation) in detail. Course activities provide opportunities to discuss and demonstrate how to prepare a final report tailored to maximize the value of the penetration test from both a management and technical perspective. Course activities include a comprehensive hands-on exercise, conducting a stepwise penetration test against a hypothetical target organization. Course topics also include the limitations of penetration testing techniques and other practices that can augment penetration testing to find vulnerabilities in architecture, policies, and processes.
MnTC Goals
None

Prerequisite(s): CFI 1083  with a grade of C or higher or instructor consent
Corequisite(s): None
Recommendation: None

Major Content
1. Ethics
  1. What is Ethical Hacking
  2. Scenarios
  3. Consequences of unethical hacking
2. Phases of Ethical Hacking
  1. Purpose of Ethical Hacking
  2. Types of tests
  3. Reconnaissance
  4. Vulnerability Analysis
  5. Exploitation
3. Reconnaissance         
  1. Open Source Intelligence
  2. Passive Information Gathering
  3. Active Information Gathering
  4. Banner Grabbing
  5. Service Enumeration
4. Vulnerability Analysis         
  1. Default/Poor Configurations
  2. Version Fingerprinting
  3. Common Vulnerabilities and Exposures (CVEs)
  4. Automated Vulnerability Scanning
5. Exploitation
  1. Metasploit Framework
  2. Buffer Overflows
  3. Brute Forcing
  4. Cracking Hashes
  5. Post Exploitation
  6. Exploit-DB
6. Report Writing
  1. Executive Summaries
  2. Evidence
  3. Recommendations
  4. Walkthroughs

Learning Outcomes
At the end of this course, students will be able to:

  1. explain what it means to hack ethically and the consequences of unethical hacking.
  2. describe the phases of ethical hacking.
  3. explain basic ethical hacking tools such as NMap and Metasploit.
  4. articulate ethical hacking findings in a professional report format.
  5. perform ethical hacking in a lab environment.
  6. identify vulnerabilities and weak systems on a lab network.
  7. articulate fixes/recommendations for identified vulnerabilities.
  8. explain the benefits of ethical hacking and how it can strengthen security programs.

Minnesota Transfer Curriculum (MnTC): Goals and Competencies
Competency Goals (MnTC Goals 1-6)
None
Theme Goals (MnTC Goals 7-10)
None


Courses and Registration



Add to Portfolio (opens a new window)