ECCU 501 Syllabus 2021
ECCU 501 Syllabus 2021
ECCU 501
Credit hours: 3
1. Course Summary
1.1 Purpose of Class:
This class is designed to provide students an insight into the current security scenario
and increasing hacking attempts on various information systems. The goal of ethical
hacking and countermeasures is to help the organizations take preemptive measures
against malicious attacks by attacking the system themselves staying within legal
limits.
1.2 Major Instructional Areas
1. Ethical Hacking Concepts and Methodology
2. Attack Vectors and Countermeasures
3. Web Attacks and Defense
4. Infrastructure Security Threats and Controls
1.3 Course Objectives:
Students who successfully complete this class will be able to:
1. Assess ethical and legal requirements of security assessment and penetration
testing and determine a strategy to comply with these requirements.
2. Analyze different phases of hacking and recommend the strategy to use ethical
hacking for assessing the security of various components of the information
system.
3. Compare and contrast different hacking techniques and analyze the legal
implications of hacking.
4. Examine different vulnerabilities, threats, and attacks to information systems and
recommend the countermeasures.
5. Analyze cryptography algorithms and encryption techniques, and design
implementation strategies for securing information
6. Compare and contrast various network security assessment and hacking tools.
7. Assess various network security techniques and tools and implement appropriate
level of information security controls based on evidence, information, and
research.
1.4 SCANS Objectives
SCANS is an acronym for Secretary’s Commission on Achieving Necessary Skills. The
committee, appointed by the National Secretary of Labor in 1990, created a list of skills
and competencies that continue to be a valuable resource for individuals developing
their careers in a high-tech job market. For more information on the SCANS objectives,
visit The U.S. Department of Labor Employment and Training Administration:
www.doleta.gov.
Quality Points
Earned
Percentage Points Grade Comments
NOTE: Each week you will have assessments that you must complete for class credit.
Please log into Canvas to complete any quizzes, discussion threads, lab assessments,
or summative assessments for each week.
4. Learning Standards
4.1 Four Standards of Performance
Always use these standards of performance anytime you write a research paper,
respond to a case study or answer discussion threads.
These 4 Standards of Performance, when used fully, will produce an excellent paper.
Depth of Reflection: Be sure to demonstrate a conscious and thorough
understanding of the writing prompt and subject matter. Analyze the evidence from
several perspectives, draw conclusions based on evidence, research and/or
experience.
Sequence your information: Your work has a clear and appropriate beginning,
development, and conclusion. Most information is organized in a clear and logical way.
There are a beginning and a conclusion. Paragraphing and transitions are adequate.
Conclusions: Draw conclusions based on evidence, research or experience. Use the
context of your readings and the assumptions the author makes.
Language Use: Use sophisticated language that is precise and interesting. Sentence
structure must be correct to the grammar of the language.
Some examples of cheating and plagiarism include but are not limited to:
Cheating Use of material, information, or study aids not permitted
by the faculty
Plagiarism Use of another’s words or ideas without acknowledging
the source of the information
Falsification or Fabrication Changing or altering data, quotes, citations, grades or
academic records
Unauthorized Collaboration Intentional sharing of information when the faculty does
not approve of such collaboration
EC-Council University will take action in all cases of academic dishonesty. The first
instance will result in a failing grade for the assignment. The second instance will result
in a failing grade in the class. The third instance will result in dismissal from the
university. A record of all instances of academic dishonesty for ECCU, as well as a
record of the action taken, will be kept in the individual student file and Dean’s file.
1. Steps to be taken in the instance of academic dishonesty are: The faculty/staff will
inform the student of the allegation and provide evidence, offering the student the
opportunity to respond and/or rectify the issue depending on the nature of the
dishonesty and the particular assignment.
2. Once the student has had a chance to respond, the faculty/staff will determine if
academic dishonesty has occurred. If the faculty/staff concludes that academic
dishonesty has occurred and has proof, they will report the student’s name, the
class and assignment, the nature of the academic dishonesty and the proof to the
Dean. The type of disciplinary action to be taken will be determined by the
student’s record of instances identified above and will be applied by the faculty
and/or the Dean.
6.2 Citing Sources
In academic communities, the ethics of research demand that writers be credited for
their work and their writing. To not do so is to plagiarize- to intentionally or
unintentionally appropriate the ideas, language, or work of another without sufficient
acknowledgment that such material is not one’s own. Whenever a student quotes,
paraphrases, summarizes or otherwise refers to the work of another, the student must
cite his or her source either by way of parenthetical citation or footnote. Unfortunately,
this is the most common form of academic dishonesty, but regardless it will be
responded to with failing grades or dismissal.
6.3 Original Content
Students are expected to create their discussion topics, assignments, and essays
using the majority of their own personal thoughts and ideas. All works must contain a
minimum of 75% original content. Any work submitted that contains more than 25%
unoriginal content regardless of whether the sources are cited properly may be
considered a violation of the academic honesty policy, depending on the nature of the
assignment, and consent of the assigned instructor.
6.4 Timeline
Discovery of violation of the Academic Honesty Policy can occur at any time. Issuance
of a grade, or even degree, can be changed if it is discovered that an academic
honesty violation occurred. The bottom line is this; it’s just not worth it.
6.5 Student Identity Verification
• EC-Council University takes measures to verify the identity of the students who
are applying to the university, completing courses, and taking proctored exams.
• Students access their courses and reference materials through our secure online
learning management system, where they are required to enter their username
and password. Students are responsible for the safeguard of their individual
credentials.
• EC-Council University implements student identity verification in several ways to
ensure proper ID.
1. A Valid Government issued ID is required with the admissions application.
2. Login credentials are required for the online LMS portal
9. Course Plan
9.1 Suggested Learning Approach
In this course, you will be studying individually and within a group of your peers. As you
work on the course deliverables, you are encouraged to share ideas with your peers
and instructor, work collaboratively on projects and team assignments, raise critical
questions, and provide constructive feedback.
Use the following advice to receive maximum learning benefits from your participation in
this course:
DO DON’T
• Do take a proactive learning approach • Don’t assume there is only one correct
answer to a question
• Do share your thoughts on critical issues
and potential problem solutions • Don’t be afraid to share your perspective
on the issues analyzed in the course
• Do plan your course work in advance
• Don’t be negative towards points of view
• Do explore a variety of learning resources
that are different from yours
in addition to the textbook
• Don’t underestimate the impact of
• Do offer relevant examples from your
collaboration on your learning
experience
• Don’t limit your course experience to
• Do make an effort to understand different
reading the textbook
points of view
• Don’t postpone your work on the course
• Do connect concepts explored in this deliverables – work on small assignment
course to real-life professional situations components every day
and your own experiences
• Don’t limit your course experience to
• Do offer relevant examples from your reading the textbook
experience
• Don’t postpone your work on the course
• Do make an effort to understand different deliverables – work on small assignment
points of view components every day
• Do connect concepts explored in this
course to real-life professional situations
and your own experiences
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 3 - Scanning Networks
▪ Chapter 4 - Enumeration
Week 3: Module 05 - Vulnerability Analysis, Module 06 - System Hacking
Quizzes Quiz 3 5
Discussion Discussion Thread 3 4
Assignment Assignment 1 5
Lab 1: Perform Vulnerability Assessment using Various 5
Vulnerability Assessment Tools
Lab
Lab 2: Gain Access to the System
Required readings Read the following Chapters from the Book: Ethical and
Countermeasures Academia Complete Series
• Chapter 5 - Vulnerability Analysis
• Chapter 6 - System Hacking
Week 4: Module 07 - Malware Threats, Module 08 - Sniffing
Quizzes Quiz 4 5
Discussion Discussion Thread 4 4
Assignment Assignment 1 5
Lab 1: Gain Access to the Target System using Trojans 5
Lab Lab 2: Perform Active Sniffing 5
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 7 - Malware Threats
▪ Chapter 8 - Sniffing
Week 5: Module 09 - Social Engineering, Module 10 - Denial-of-Service
Quizzes Quiz 5 5
Discussion Discussion Thread 5 4
Assignment Assignment 1 5
Lab 1: Perform Social Engineering using Various 5
Techniques
Lab
Lab 2: Perform DoS and DDoS Attacks using Various
5
Techniques
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 9 - Social Engineering
▪ Chapter 10 - Denial-of-Service
Week 6: Module 11 - Session Hijacking, Module 12 - Evading IDS, Firewalls, and Honeypot
Quizzes Quiz 6 5
Discussion Discussion Thread 6 4
Assignment Assignment 1 5
Lab 1: Perform Session Hijacking 5
Lab Lab 2: Evade Firewalls using Various Evasion Techniques 5
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 11 - Session Hijacking
▪ Chapter 12 - Evading IDS, Firewalls, and
Honeypots
Week 7: Module 13 - Hacking Web Servers, Module 14 - Hacking Web Applications
Quizzes Quiz 7 5
Discussion Discussion Thread 7 4
Assignment Assignment 1 5
Lab 1: Perform a Web Server Attack 5
Lab Lab 2: Perform Web Application Attacks 5
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 13 - Hacking Web servers
▪ Chapter 14 - Hacking Web Applications
Week 8: Module 15 - SQL Injection, Module 16 - Hacking Wireless Networks
Quizzes Quiz 8 5
Discussion Discussion Thread 8 4
Assignment Assignment 1 5
Lab 1: Perform SQL Injection Attacks 5
Lab Lab 2: Perform Wireless Attacks 5
Required readings Read the following Chapters from the Book: Ethical and
Countermeasures Academia Complete Series
Required readings Read the following Chapters from the Book: Ethical and
Countermeasures Academia Complete Series
▪ Chapter 17 - Hacking Mobile Platforms
▪ Chapter 18 – Hacking IoT and OT
Week 10: Module 19 - Cloud Computing, Module 20 - Cryptography
Quizzes Quiz 10 5
Discussion Discussion Thread 10 4
Assignment Assignment 5
Lab 1: Perform S3 Bucket Enumeration using Various S3 5
Bucket Enumeration Tools
Lab 5
Lab 2: Perform Disk Encryption
Required readings Read the following chapters from the book Ethical and
Countermeasures Academia Complete Series
▪ Chapter 19 - Cloud Computing
▪ Chapter 20 - Cryptography
Week 11: Research Project
Research Project Summative Assessment Research Project 60
Week 12: Final Examination
Final Exam Summative Assessment Final Examination 100