0% found this document useful (0 votes)
210 views12 pages

ECCU 501 Syllabus 2021

Uploaded by

hatfiod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views12 pages

ECCU 501 Syllabus 2021

Uploaded by

hatfiod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Master of Science in Cyber Security

ECCU 501

Ethical Hacking and Countermeasures

Student Course Syllabus

Instructor Contact Information


Instructor Name: Warren Mack
Email: [email protected]
Office Hours: Online
Office Location: By prior appointment
Phone Contact: Email

Credit hours: 3

Page 1 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

1. Course Summary
1.1 Purpose of Class:
This class is designed to provide students an insight into the current security scenario
and increasing hacking attempts on various information systems. The goal of ethical
hacking and countermeasures is to help the organizations take preemptive measures
against malicious attacks by attacking the system themselves staying within legal
limits.
1.2 Major Instructional Areas
1. Ethical Hacking Concepts and Methodology
2. Attack Vectors and Countermeasures
3. Web Attacks and Defense
4. Infrastructure Security Threats and Controls
1.3 Course Objectives:
Students who successfully complete this class will be able to:
1. Assess ethical and legal requirements of security assessment and penetration
testing and determine a strategy to comply with these requirements.
2. Analyze different phases of hacking and recommend the strategy to use ethical
hacking for assessing the security of various components of the information
system.
3. Compare and contrast different hacking techniques and analyze the legal
implications of hacking.
4. Examine different vulnerabilities, threats, and attacks to information systems and
recommend the countermeasures.
5. Analyze cryptography algorithms and encryption techniques, and design
implementation strategies for securing information
6. Compare and contrast various network security assessment and hacking tools.
7. Assess various network security techniques and tools and implement appropriate
level of information security controls based on evidence, information, and
research.
1.4 SCANS Objectives
SCANS is an acronym for Secretary’s Commission on Achieving Necessary Skills. The
committee, appointed by the National Secretary of Labor in 1990, created a list of skills
and competencies that continue to be a valuable resource for individuals developing
their careers in a high-tech job market. For more information on the SCANS objectives,
visit The U.S. Department of Labor Employment and Training Administration:
www.doleta.gov.

Page 2 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

2. Evaluation and Grading


2.1 ECCU Academic Credit and Grading Policy:
The academic credit used by ECCU is based off twelve-week courses that constitute
three credits per course. All courses constitute approximately 135 hours of work per
course (reading, Online Discussion Forum postings, assignments, papers, and
supplementary requirements).
2.2 Point-grade breakdown:
The ECCU Course grading structure will follow the Academic Grading Symbols and
Quality Points Earned

Quality Points
Earned
Percentage Points Grade Comments

93 – 100% 372-400 A Superior Attainment of Course 4.0


Outcomes
90 – 92% 360-371 A- 3.67
86 – 89% 348-359 B+ 3.33
83 – 86% 332-347 B Good Attainment of Course Outcomes 3.0
80 – 82% 320-331 B- 2.67
77 – 79% 308-319 C+ Acceptable Attainment of Course 2.33
Outcomes
73 – 76% 292-307 C 2.0
70 – 72% 280-291 C- 1.67
< 70% 000-279 F Non-Attainment of Course Outcomes 0.0

2.3 Assessment and Grading Structure

Nos. Value Total Weightage


(%)

Weekly Quizzes (QZ) 50 1 50 12.5


Discussion Threads (DT) 10 4 40 10
Weekly Assignments (WS) 10 5 50 12.5
Lab Assignments (LA) 20 5 100 25
Research Paper (RP) 1 60 60 15
Final Exam Quiz (FE) 50 2 100 25
Total Possible Score 400 100

NOTE: Each week you will have assessments that you must complete for class credit.
Please log into Canvas to complete any quizzes, discussion threads, lab assessments,
or summative assessments for each week.

Page 3 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

3. Master of Science in Cyber Security (MSCS) Program


Objectives
1. Application of technical strategies, tools, and techniques to secure data and
information for a customer or client
2. Adherence to a high standard of ethical behavior
3. Use of research in both established venues and innovative applications to expand
the body of knowledge in information assurance
4. Application of principles of critical thinking to creatively and systematically solve the
problems and meet the challenges of the ever-changing environments of
cybersecurity
5. Mastery of the skills necessary to move into leadership roles in companies,
agencies, divisions, or departments

4. Learning Standards
4.1 Four Standards of Performance
Always use these standards of performance anytime you write a research paper,
respond to a case study or answer discussion threads.
These 4 Standards of Performance, when used fully, will produce an excellent paper.
Depth of Reflection: Be sure to demonstrate a conscious and thorough
understanding of the writing prompt and subject matter. Analyze the evidence from
several perspectives, draw conclusions based on evidence, research and/or
experience.
Sequence your information: Your work has a clear and appropriate beginning,
development, and conclusion. Most information is organized in a clear and logical way.
There are a beginning and a conclusion. Paragraphing and transitions are adequate.
Conclusions: Draw conclusions based on evidence, research or experience. Use the
context of your readings and the assumptions the author makes.
Language Use: Use sophisticated language that is precise and interesting. Sentence
structure must be correct to the grammar of the language.

5. Additional Notes and Expectations


5.1 Attendance
Documenting Attendance in Distance Education Courses
Changes to federal regulations in recent years have highlighted the importance of
accurate reporting on student attendance and participation in all courses, including
distance education courses (online and hybrid/blended courses).

Page 4 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

In order to comply, EC Council University is providing the following procedural


guidance to faculty when filling out your non‐participation rosters. A student attends an
online course (or the online portion of a hybrid/blended course) by participating in class
or otherwise engaging in an academically related activity. Examples of such activity
include but are not limited to:
1. Contributing to an online discussion or text chat session
2. Submitting an assignment or working draft; working through exercises
3. Taking a quiz or exams
4. Viewing and/or completing a tutorial
5. Initiating contact with a faculty member to ask a course‐related question.
Such academically related activities are readily tracked and documented through the
University learning management system, email system, and in some cases publisher
websites. Documenting that a student has logged into an online class or website is not
sufficient, by itself, to demonstrate academic attendance by the student. For example,
if a student simply logs into an online course on September 15 and logs out, without
any further activity, the student did not attend the online class on that day.
Late Assignments Late assignments are not in the student’s best interest. In that
regard, if you have a problem that will not allow you to complete the assignments in a
timely manner, please send the instructor an immediate request and explanation. It is
the instructor’s option, decision and discretion to accept or reject the student’s request.
Continued requests will not be accepted, and the student may be dropped from the
course at the instructor’s request.
Writing Skills If your writing skills are not the best, there are some modules under
“Student Orientation” in the LMS that can help you prepare for your writing process, or
you may want to purchase a basic writing skills book that will help you.

6. Academic Honesty Policy


6.1 ECCU Course Policies On Cheating and Plagiarism
As a model of the highest ethical standards and as an institution of higher learning,
EC-Council University expects its students to conduct themselves with an
unquestionable level of honesty and integrity. EC-Council University will not tolerate
academic cheating or plagiarism in any form. Learning to think and work independently
is not only a part of the educational process; it is the educational process. Cheating or
plagiarism in any form is considered a serious violation of university policy, which each
student agreed to when accepted into the program. Student academic behaviors that
violate the university policy will result in disciplinary action, without exception.
University policy can be summarized simply: As a student, you are responsible for your
own work, and you are responsible for your own actions.

Page 5 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

Some examples of cheating and plagiarism include but are not limited to:
Cheating Use of material, information, or study aids not permitted
by the faculty
Plagiarism Use of another’s words or ideas without acknowledging
the source of the information
Falsification or Fabrication Changing or altering data, quotes, citations, grades or
academic records
Unauthorized Collaboration Intentional sharing of information when the faculty does
not approve of such collaboration
EC-Council University will take action in all cases of academic dishonesty. The first
instance will result in a failing grade for the assignment. The second instance will result
in a failing grade in the class. The third instance will result in dismissal from the
university. A record of all instances of academic dishonesty for ECCU, as well as a
record of the action taken, will be kept in the individual student file and Dean’s file.
1. Steps to be taken in the instance of academic dishonesty are: The faculty/staff will
inform the student of the allegation and provide evidence, offering the student the
opportunity to respond and/or rectify the issue depending on the nature of the
dishonesty and the particular assignment.
2. Once the student has had a chance to respond, the faculty/staff will determine if
academic dishonesty has occurred. If the faculty/staff concludes that academic
dishonesty has occurred and has proof, they will report the student’s name, the
class and assignment, the nature of the academic dishonesty and the proof to the
Dean. The type of disciplinary action to be taken will be determined by the
student’s record of instances identified above and will be applied by the faculty
and/or the Dean.
6.2 Citing Sources
In academic communities, the ethics of research demand that writers be credited for
their work and their writing. To not do so is to plagiarize- to intentionally or
unintentionally appropriate the ideas, language, or work of another without sufficient
acknowledgment that such material is not one’s own. Whenever a student quotes,
paraphrases, summarizes or otherwise refers to the work of another, the student must
cite his or her source either by way of parenthetical citation or footnote. Unfortunately,
this is the most common form of academic dishonesty, but regardless it will be
responded to with failing grades or dismissal.
6.3 Original Content
Students are expected to create their discussion topics, assignments, and essays
using the majority of their own personal thoughts and ideas. All works must contain a
minimum of 75% original content. Any work submitted that contains more than 25%
unoriginal content regardless of whether the sources are cited properly may be
considered a violation of the academic honesty policy, depending on the nature of the
assignment, and consent of the assigned instructor.

Page 6 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

6.4 Timeline
Discovery of violation of the Academic Honesty Policy can occur at any time. Issuance
of a grade, or even degree, can be changed if it is discovered that an academic
honesty violation occurred. The bottom line is this; it’s just not worth it.
6.5 Student Identity Verification
• EC-Council University takes measures to verify the identity of the students who
are applying to the university, completing courses, and taking proctored exams.
• Students access their courses and reference materials through our secure online
learning management system, where they are required to enter their username
and password. Students are responsible for the safeguard of their individual
credentials.
• EC-Council University implements student identity verification in several ways to
ensure proper ID.
1. A Valid Government issued ID is required with the admissions application.
2. Login credentials are required for the online LMS portal

7. Required Texts throughout this Course


The following texts will be required for this course:
Ethical Hacking and Countermeasures Complete Series Version 11
The corresponding chapters for each week are embedded in your weekly readings.
Note: You will be asked to Signup into VitalSource if you are accessing this book for the first
time. You can use this account for accessing/purchasing other VitalSource books in the future.

8. Cloud-Based Cyber Range – iLabs


iLabs practical learning environment is revolutionizing the way Cyber Security is taught, get
started now. Practical Hands-On learning provides access to real-world tools and scenarios,
boosts knowledge retention and is proven to be more effective at preparing you for the job. You
can access your virtual private cloud/ cyber range from anywhere with an internet connection.
Be instantly connected to all of the iLabs exercises at any time, 24x7. After login, you will have
full access to preconfigured targets, networks, and the attack tools necessary to exploit them.

Page 7 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

9. Course Plan
9.1 Suggested Learning Approach
In this course, you will be studying individually and within a group of your peers. As you
work on the course deliverables, you are encouraged to share ideas with your peers
and instructor, work collaboratively on projects and team assignments, raise critical
questions, and provide constructive feedback.
Use the following advice to receive maximum learning benefits from your participation in
this course:

DO DON’T
• Do take a proactive learning approach • Don’t assume there is only one correct
answer to a question
• Do share your thoughts on critical issues
and potential problem solutions • Don’t be afraid to share your perspective
on the issues analyzed in the course
• Do plan your course work in advance
• Don’t be negative towards points of view
• Do explore a variety of learning resources
that are different from yours
in addition to the textbook
• Don’t underestimate the impact of
• Do offer relevant examples from your
collaboration on your learning
experience
• Don’t limit your course experience to
• Do make an effort to understand different
reading the textbook

Page 8 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

points of view
• Don’t postpone your work on the course
• Do connect concepts explored in this deliverables – work on small assignment
course to real-life professional situations components every day
and your own experiences
• Don’t limit your course experience to
• Do offer relevant examples from your reading the textbook
experience
• Don’t postpone your work on the course
• Do make an effort to understand different deliverables – work on small assignment
points of view components every day
• Do connect concepts explored in this
course to real-life professional situations
and your own experiences

10. Course Outline


Points
Grading Category Activity Title Allocation

Week 1: Module 01 - Introduction to Ethical Hacking, Module 02 - Footprinting and


Reconnaissance
Quizzes Quiz 1 5
Discussion Discussion Thread 1 4
Assignment Assignment 1 5

Lab 1: Perform Website Footprinting 5


Lab Lab 2: Perform Footprinting using Various Footprinting 5
Tools
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 1 - Introduction to Ethical Hacking
▪ Chapter 2 - Footprinting and Reconnaissance
Week 2: Module 03 - Scanning Networks, Module 04 - Enumeration
Quizzes Quiz 2 5
Discussion Discussion Thread 2 4
Assignment Assignment 1 5
Lab 1: Perform Network Scanning using Various Scanning 5
Tools
Lab
Lab 2: Perform Enumeration using Various Enumeration
5
Tools

Page 9 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 3 - Scanning Networks
▪ Chapter 4 - Enumeration
Week 3: Module 05 - Vulnerability Analysis, Module 06 - System Hacking
Quizzes Quiz 3 5
Discussion Discussion Thread 3 4
Assignment Assignment 1 5
Lab 1: Perform Vulnerability Assessment using Various 5
Vulnerability Assessment Tools
Lab
Lab 2: Gain Access to the System
Required readings Read the following Chapters from the Book: Ethical and
Countermeasures Academia Complete Series
• Chapter 5 - Vulnerability Analysis
• Chapter 6 - System Hacking
Week 4: Module 07 - Malware Threats, Module 08 - Sniffing
Quizzes Quiz 4 5
Discussion Discussion Thread 4 4
Assignment Assignment 1 5
Lab 1: Gain Access to the Target System using Trojans 5
Lab Lab 2: Perform Active Sniffing 5
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 7 - Malware Threats
▪ Chapter 8 - Sniffing
Week 5: Module 09 - Social Engineering, Module 10 - Denial-of-Service
Quizzes Quiz 5 5
Discussion Discussion Thread 5 4
Assignment Assignment 1 5
Lab 1: Perform Social Engineering using Various 5
Techniques
Lab
Lab 2: Perform DoS and DDoS Attacks using Various
5
Techniques

Page 10 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 9 - Social Engineering
▪ Chapter 10 - Denial-of-Service

Week 6: Module 11 - Session Hijacking, Module 12 - Evading IDS, Firewalls, and Honeypot

Quizzes Quiz 6 5
Discussion Discussion Thread 6 4
Assignment Assignment 1 5
Lab 1: Perform Session Hijacking 5
Lab Lab 2: Evade Firewalls using Various Evasion Techniques 5
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 11 - Session Hijacking
▪ Chapter 12 - Evading IDS, Firewalls, and
Honeypots
Week 7: Module 13 - Hacking Web Servers, Module 14 - Hacking Web Applications
Quizzes Quiz 7 5
Discussion Discussion Thread 7 4
Assignment Assignment 1 5
Lab 1: Perform a Web Server Attack 5
Lab Lab 2: Perform Web Application Attacks 5
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 13 - Hacking Web servers
▪ Chapter 14 - Hacking Web Applications
Week 8: Module 15 - SQL Injection, Module 16 - Hacking Wireless Networks
Quizzes Quiz 8 5
Discussion Discussion Thread 8 4
Assignment Assignment 1 5
Lab 1: Perform SQL Injection Attacks 5
Lab Lab 2: Perform Wireless Attacks 5

Required readings Read the following Chapters from the Book: Ethical and
Countermeasures Academia Complete Series

Page 11 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited
Syllabus: ECCU 501- Ethical Hacking and
Countermeasures

▪ Chapter 15 - SQL Injection


▪ Chapter 16 - Hacking Wireless Networks
Week 9: Module 17 - Hacking Mobile Platforms, Module 18 - Hacking IoT and OT
Quizzes Quiz 9 5
Discussion Discussion Thread 9 4
Assignment Assignment 1 5
Lab 1: Hack Android Devices 5
Lab Lab 2: Capture and Analyze IoT Device Traffic 5

Required readings Read the following Chapters from the Book: Ethical and
Countermeasures Academia Complete Series
▪ Chapter 17 - Hacking Mobile Platforms
▪ Chapter 18 – Hacking IoT and OT
Week 10: Module 19 - Cloud Computing, Module 20 - Cryptography
Quizzes Quiz 10 5
Discussion Discussion Thread 10 4
Assignment Assignment 5
Lab 1: Perform S3 Bucket Enumeration using Various S3 5
Bucket Enumeration Tools
Lab 5
Lab 2: Perform Disk Encryption

Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 19 - Cloud Computing
▪ Chapter 20 - Cryptography
Week 11: Research Project
Research Project Summative Assessment Research Project 60
Week 12: Final Examination
Final Exam Summative Assessment Final Examination 100

11. Academic Integrity


All students must comply with the policies that regulate all forms of academic dishonesty, or
academic misconduct, including plagiarism, self-plagiarism, fabrication, deception, cheating,
and sabotage.
If you have any queries regarding this course, feel free to contact your instructor.
(End of Syllabus)

Page 12 Ethical Hacking and Countermeasures Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited

You might also like