This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: SYLLABUS: Hacker Techniques, Tools and Incident Handling I n s t r u c t o r : M r . S A M N O O R Y E m a i l : s n o o r y @ i t t - t e c h . e d u Class hours: Lab 6:00PM 7:45PM Lectures 8:15PM --- COCURSE OVERVIEW This course is a part of the ISS curriculum. It builds on the foundation laid in the IS316 Fundamentals of Network Security, Firewalls, and VPNs. In the IS316 course, you learned how firewalls are used to protect a network. In this course, you will learn how to examine the vulnerabilities in a network and recommend solutions to remove the vulnerabilities. INTENT/INTERFACE This course is designed to provide you a strong foundation that you as a network security professional or penetration tester will be able to use to examine, analyze, and make informed decisions regarding network security. Hackers are constantly reinventing their methodology so that you need to be skilled to constantly understand their activities and mitigate the potential damage they might cause. This course will provide you the knowledge required to perform penetration testing with the help of hands-on exercises and examination of real world tools. In addition, you will learn techniques to prevent hackers from compromising systems and networks. COURSE OBJECTIVES After successful completion of this course, the student will have the opportunity to: Identify the classes of hackers and the ethical use of penetration analysis tools. Describe the environment where network security is applied. Identify classes of network monitoring and management tools as they relate to network security. Identify multiple classes of computer and network vulnerabilities. Conduct network footprinting. Describe tools used to test for multiple types of computer and network vulnerabilities. Evaluate the role penetration testing plays in demonstrating the existence of network vulnerabilities. Identify best practices for protecting networks and hosts. Apply the provision of National Institute of Standards and Technology (NIST) publications SP 800-42 and SP 800-35. Explore ITT Tech Virtual Library to describe hacker related incidents and computer vulnerabilities. Related SCANS Objectives Troubleshoot the problems in the security architecture of an organization. Demonstrate, applying technical skills, how components of a network interact within and outside the network. Evaluate the set of procedures, tools, or computers and their programs that can help create secure network architecture for an organization. Create secure network architecture for an organization. Identify the knowledge of security requirements of an organization with the best application of information assurance practices. Classify the availability, integrity, and confidentiality of data in an orderly manner to ensure the specific security requirements of an organization....
View Full Document
- Spring '11