Ethical Hacking - CNET 331 Course Outline
Ethical Hacking - CNET 331 Course Outline
Course Hours/Credits: 56
Co-requisites: N/A
Approved by:
Chairperson/Dean
Students are expected to review and understand all areas of the course outline.
Retain this course outline for future transfer credit applications. A fee may be charged for
additional copies.
Course Description
This course will give students an in-depth knowledge of ethical hacking and penetration testing. In this
course, different attackers’ tactics, strategies, and approaches will be discussed. Ethical Hacking course
presents a variety of approaches such as scanning, system hacking, malware detection, sniffing, and
social engineering for finding existing vulnerabilities and discovering intrusions in the network. It also
discusses the latest known attack vectors. This course also provides information on the tools which are
required to defend against attackers. It examines and reviews various types of hacking tools and ways to
harden the system or application against the attacks.
Program Outcomes
Successful completion of this and other courses in the program culminates in the achievement of the
Vocational Learning Outcomes (program outcomes) set by the Ministry of Colleges and Universities in the
Program Standard. The VLOs express the learning a student must reliably demonstrate before
graduation. To ensure a meaningful learning experience and to better understand how this course and
program prepare graduates for success, students are encouraged to review the Program Standard by
visiting http://www.tcu.gov.on.ca/pepg/audiences/colleges/progstan/. For apprenticeship-based programs,
visit http://www.collegeoftrades.ca/training-standards.
978-1-63567-526-9 - Certified Ethical Hacker (CEH) Version 11 iLabs (Volume 1: Ethical Hacking
Concepts and Methodology)
978-1-63567-527-6 - Certified Ethical Hacker (CEH) Version 11 iLabs (Volume 2: Attack Vectors and
Countermeasures)
Material(s) required for completing this course:
As the college is situated in Toronto, Ontario, Canada, we operate under the Eastern Standard Time
Zone (EST). All due dates and time lines are based upon EST. Please adjust your clocks and calendars
to ensure timely submission of work.
The following are the recommended technical requirements for the course:
Web browser: recommended Google Chrome or Firefox
Also recommended: keyboard, mouse, headset, webcam
All items improve experience but only a computer and internet are ultimately needed
Evaluation Scheme
➮ Lab Work/Class Activity: Lab/Class Activity
➮ Assignment: In class Assignments/Home Assignments
➮ Test 1: Theory Test
➮ Project: Students will do a research on one category of ethical hacking and define the corresponding
All submitted work may be reviewed for authenticity and originality utilizing Turnitin®. Students who do not
wish to have their work submitted to Turnitin® must, by the end of the second week of class,
communicate this in writing to the instructor and make mutually agreeable alternate arrangements.
When writing tests, students must be able to produce official Centennial College photo identification or
they may be refused the right to take the test or test results will be void.
Tests or assignments conducted remotely may require the use of online proctoring technology where the
student’s identification is verified and their activity is monitored and/or recorded, both audibly and visually
through remote access to the student's computer and web camera. Students must communicate in writing
to the instructor as soon as possible and prior to the test or assignment due date if they require an
alternate assessment format to explore mutually agreeable alternatives.
Student Accommodation
The Centre for Accessible Learning and Counselling Services (CALCS) (http://centennialcollege.ca/calcs)
provides programs and services which empower students in meeting their wellness goals,
accommodation and disability-related needs. Our team of professional psychotherapists, social workers,
educators, and staff offer brief, solution-focused psychotherapy, accommodation planning, health and
wellness education, group counselling, psycho-educational workshops, adaptive technology, and peer
support. Walk in for your first intake session at one of our service locations (Ashtonbee Room L1-04,
Morningside Room 190, Progress Room C1-03, The Story Arts Centre Room 285, Downsview Room 105)
or contact us at [email protected], 416-289-5000 ext. 3850 to learn more about accessing
CALCS services.
Use of Dictionaries
THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 4
CNET 331 CENTENNIAL COLLEGE Ethical Hacking
Course Policies
To pass the course students must achieve an average of 50% from total average in the course. In
addition, the student MUST pass 70%, that is, complete successfully, 7 out of 10 of the Hands-On LABs
portion of the course.
College Policies
Students should familiarize themselves with all College Policies that cover academic matters and student
conduct.
All students and employees have the right to study and work in an environment that is free from
discrimination and harassment and promotes respect and equity. Centennial policies ensure all incidents
of harassment, discrimination, bullying and violence will be addressed and responded to accordingly.
Academic Honesty
Academic honesty is integral to the learning process and a necessary ingredient of academic integrity.
Forms of academic dishonesty include cheating, plagiarism, and impersonation, among others. Breaches
of academic honesty may result in a failing grade on the assignment or course, suspension, or expulsion
from the college. Students are bound to the College’s AC100-11 Academic Honesty and Plagiarism
policy.
To learn more, please visit the Libraries information page about Academic Integrity
https://libraryguides.centennialcollege.ca/academicintegrity and review Centennial College's Academic
Honesty Module:
https://myappform.centennialcollege.ca/ecentennial/articulate/Centennial_College_Academic_Integrity_M
odule_%202/story.html
Materials used in Centennial College courses are subject to Intellectual Property and Copyright
protection, and as such cannot be used and posted for public dissemination without prior permission from
the original creator or copyright holder (e.g., student/professor/the College/or third-party source). This
includes class/lecture recordings, course materials, and third-party copyright-protected materials (such as
images, book chapters and articles). Copyright protections are automatic once an original work is created,
and applies whether or not a copyright statement appears on the material. Students and employees are
bound by College policies, including AC100-22 Intellectual Property, and SL100-02 Student Code of
Conduct, and any student or employee found to be using or posting course materials or recordings for
public dissemination without permission and/or inappropriately is in breach of these policies and may be
sanctioned.
For more information on these and other policies, please visit www.centennialcollege.ca/about-
centennial/college-overview/college-policies.
Students enrolled in a joint or collaborative program are subject to the partner institution's academic
policies.
PLAR Process
This course is eligible for Prior Learning Assessment and Recognition (PLAR). PLAR is a process by
which course credit may be granted for past learning acquired through work or other life experiences. The
PLAR process involves completing an assessment (portfolio, test, assignment, etc.) that reliably
demonstrates achievement of the course learning outcomes. Contact the academic school to obtain
information on the PLAR process and the required assessment.
This course outline and its associated weekly topical(s) may not be reproduced, in whole or in
part, without the prior permission of Centennial College.
Phases of an Attack
Types of Hackers
CLO 1-3,6
2 Footprinting and Chapter 2 Steganography and Steganalysis Professor-led Week 2
Reconnaissance Certified Ethical Hacker Instruction
(CEH) Version 11 Explain Footprinting Concepts
Lab 1 (Initiate)
Identify Footprinting through Search Engines
and Advanced Google Hacking Techniques Project
(Introduce)
Identify Footprinting through Web Services
and Social Networking Sites
Week Topics Readings/Materials Weekly Learning Outcome(s) Instructional Strategies Evaluation Evaluation
Name and Date
Weight
(CEH) Version 11 Scanning Techniques and Host Discovery
Lab 2 (Initiate)
Perform OS Discovery
Week Topics Readings/Materials Weekly Learning Outcome(s) Instructional Strategies Evaluation Evaluation
Name and Date
Weight
6 System Hacking Chapter 6 Overview of CEH Hacking Methodology Professor-led Lab 4 (4%) Lab 4 Due
Certified Ethical Hacker Instruction in Week 6
(CEH) Version 11 Identify Techniques to Gain Access to the
System Lab 5 (Initiate)
Week Topics Readings/Materials Weekly Learning Outcome(s) Instructional Strategies Evaluation Evaluation
Name and Date
Weight
Sniffing Techniques Lab 7 (Initiate)