0% found this document useful (0 votes)
135 views

Ethical Hacking - CNET 331 Course Outline

Ethical Hacking - CNET 331 Course Outline

Uploaded by

youinus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
135 views

Ethical Hacking - CNET 331 Course Outline

Ethical Hacking - CNET 331 Course Outline

Uploaded by

youinus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Course Outline

School: Eng. Tech. & Applied Science

Department: Information and Communication


Engineering Technology (ICET)

Course Title: Ethical Hacking

Course Code: CNET 331

Course Hours/Credits: 56

Prerequisites: CNET 239

Co-requisites: N/A

Eligible for Prior Learning, Yes


Assessment and Recognition:

Originated by: Marjan Zandi

Creation Date: Summer 2020

Revision Date: Fall 2021

Current Semester: Winter 2023

Approved by:

Chairperson/Dean

Students are expected to review and understand all areas of the course outline.

Retain this course outline for future transfer credit applications. A fee may be charged for
additional copies.

This course outline is available in alternative formats upon request.


CNET 331 CENTENNIAL COLLEGE Ethical Hacking

Acknowledgement of Traditional Lands


Centennial is proud to be a part of a rich history of education in this province and in this city. We
acknowledge that we are on the treaty lands and territory of the Mississaugas of the Credit First Nation
and pay tribute to their legacy and the legacy of all First Peoples of Canada, as we strengthen ties with
the communities we serve and build the future through learning and through our graduates. Today the
traditional meeting place of Toronto is still home to many Indigenous People from across Turtle Island and
we are grateful to have the opportunity to work in the communities that have grown in the treaty lands of
the Mississaugas. We acknowledge that we are all treaty people and accept our responsibility to honor all
our relations.

Course Description
This course will give students an in-depth knowledge of ethical hacking and penetration testing. In this
course, different attackers’ tactics, strategies, and approaches will be discussed. Ethical Hacking course
presents a variety of approaches such as scanning, system hacking, malware detection, sniffing, and
social engineering for finding existing vulnerabilities and discovering intrusions in the network. It also
discusses the latest known attack vectors. This course also provides information on the tools which are
required to defend against attackers. It examines and reviews various types of hacking tools and ways to
harden the system or application against the attacks.

Program Outcomes
Successful completion of this and other courses in the program culminates in the achievement of the
Vocational Learning Outcomes (program outcomes) set by the Ministry of Colleges and Universities in the
Program Standard. The VLOs express the learning a student must reliably demonstrate before
graduation. To ensure a meaningful learning experience and to better understand how this course and
program prepare graduates for success, students are encouraged to review the Program Standard by
visiting http://www.tcu.gov.on.ca/pepg/audiences/colleges/progstan/. For apprenticeship-based programs,
visit http://www.collegeoftrades.ca/training-standards.

Course Learning Outcomes


The student will reliably demonstrate the ability to:
1. Appraise the changing nature of hacking techniques and their impact on the evolving role and
challenges faced by network defense and countermeasures.
2. Describe the critical role of network defense and countermeasures in protecting business
information and operations.
3. Explain the roles and ethical responsibilities of a security professional in monitoring and protecting
a data network
4. Assess attack techniques against web sites and propose methods for hardening web resources.
5. Analyze emerging hacking trends and threats on IT systems, applications and networks, like
Ransomware, Advanced Persistant Threat and the corresponding countermeasures’ methodologies
and technologies
6. Perform both passive and competitive intelligence gathering
7. Evaluate enumeration and scanning techniques and countermeasures
8. Perform password cracking techniques and countermeasures
9. Identify different types of Malware and their access methods
THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 2
CNET 331 CENTENNIAL COLLEGE Ethical Hacking

10. Understand types of attacks such as sniffing and DDOS


11. Implement the countermeasures for social engineering
12. Research emerging hacking trends and threats on IT systems, applications and networks, like
Ransomware, Advanced Persistant Threat, Spear phishing, and the corresponding
countermeasures’ methodologies and technologies.

Essential Employability Skills (EES)


The student will reliably demonstrate the ability to*:
1. Communicate clearly, concisely and correctly in the written, spoken, and visual form that fulfills the
purpose and meets the needs of the audience.
2. Respond to written, spoken, or visual messages in a manner that ensures effective
communication.
4. Apply a systematic approach to solve problems.
*There are 11 Essential Employability Skills outcomes as per the Ministry Program Standard. Of these 11 outcomes, the following will be
assessed in this course.

Global Citizenship and Equity (GC&E) Outcomes


N/A

Text and other Instructional/Learning Materials


Text Book(s):
Title: CEH Version 11 (Volumes 1-4) eBook
ISBN: 978-1-63567-861-1

CEH version 11 iLabs:

978-1-63567-526-9 - Certified Ethical Hacker (CEH) Version 11 iLabs (Volume 1: Ethical Hacking
Concepts and Methodology)
978-1-63567-527-6 - Certified Ethical Hacker (CEH) Version 11 iLabs (Volume 2: Attack Vectors and
Countermeasures)
Material(s) required for completing this course:
As the college is situated in Toronto, Ontario, Canada, we operate under the Eastern Standard Time
Zone (EST). All due dates and time lines are based upon EST. Please adjust your clocks and calendars
to ensure timely submission of work.
The following are the recommended technical requirements for the course:
Web browser: recommended Google Chrome or Firefox
Also recommended: keyboard, mouse, headset, webcam
All items improve experience but only a computer and internet are ultimately needed

Evaluation Scheme
➮ Lab Work/Class Activity: Lab/Class Activity
➮ Assignment: In class Assignments/Home Assignments
➮ Test 1: Theory Test
➮ Project: Students will do a research on one category of ethical hacking and define the corresponding

THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 3


CNET 331 CENTENNIAL COLLEGE Ethical Hacking

countermeasures. Student have to submit a technical report, conduct a presentation and


demonstration.
➮ Test 2: Theory Test
Evaluation Name CLO(s) EES GCE Weight/100
Outcome(s) Outcome(s)
Lab Work/Class Activity 4, 5, 6, 7, 8, 1, 2, 4 35
9, 10, 11
Assignment 1, 2, 3, 4, 5, 4 5
6, 8, 9, 10,
11, 12
Test 1 1, 2, 3, 4, 5, 4 20
6, 7, 8
Project 1, 2, 3, 4, 5, 1, 2, 4 20
6, 7, 8, 9, 10,
11, 12
Test 2 1, 2, 3, 4, 5, 4 20
6, 7, 8, 9, 10,
11
Total 100%
If students are unable to write a test they should immediately contact their professor or program Chair for
advice. In exceptional and well documented circumstances (e.g. unforeseen family problems, serious
illness, or death of a close family member), students may be able to write a make-up test.

All submitted work may be reviewed for authenticity and originality utilizing Turnitin®. Students who do not
wish to have their work submitted to Turnitin® must, by the end of the second week of class,
communicate this in writing to the instructor and make mutually agreeable alternate arrangements.

When writing tests, students must be able to produce official Centennial College photo identification or
they may be refused the right to take the test or test results will be void.

Tests or assignments conducted remotely may require the use of online proctoring technology where the
student’s identification is verified and their activity is monitored and/or recorded, both audibly and visually
through remote access to the student's computer and web camera. Students must communicate in writing
to the instructor as soon as possible and prior to the test or assignment due date if they require an
alternate assessment format to explore mutually agreeable alternatives.

Student Accommodation
The Centre for Accessible Learning and Counselling Services (CALCS) (http://centennialcollege.ca/calcs)
provides programs and services which empower students in meeting their wellness goals,
accommodation and disability-related needs. Our team of professional psychotherapists, social workers,
educators, and staff offer brief, solution-focused psychotherapy, accommodation planning, health and
wellness education, group counselling, psycho-educational workshops, adaptive technology, and peer
support. Walk in for your first intake session at one of our service locations (Ashtonbee Room L1-04,
Morningside Room 190, Progress Room C1-03, The Story Arts Centre Room 285, Downsview Room 105)
or contact us at [email protected], 416-289-5000 ext. 3850 to learn more about accessing
CALCS services.

Use of Dictionaries
THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 4
CNET 331 CENTENNIAL COLLEGE Ethical Hacking

• Dictionary use is not permitted in test or examination settings.

Program or School Policies


N/A

Course Policies
To pass the course students must achieve an average of 50% from total average in the course. In
addition, the student MUST pass 70%, that is, complete successfully, 7 out of 10 of the Hands-On LABs
portion of the course.

College Policies
Students should familiarize themselves with all College Policies that cover academic matters and student
conduct.

All students and employees have the right to study and work in an environment that is free from
discrimination and harassment and promotes respect and equity. Centennial policies ensure all incidents
of harassment, discrimination, bullying and violence will be addressed and responded to accordingly.

Academic Honesty

Academic honesty is integral to the learning process and a necessary ingredient of academic integrity.
Forms of academic dishonesty include cheating, plagiarism, and impersonation, among others. Breaches
of academic honesty may result in a failing grade on the assignment or course, suspension, or expulsion
from the college. Students are bound to the College’s AC100-11 Academic Honesty and Plagiarism
policy.

To learn more, please visit the Libraries information page about Academic Integrity
https://libraryguides.centennialcollege.ca/academicintegrity and review Centennial College's Academic
Honesty Module:
https://myappform.centennialcollege.ca/ecentennial/articulate/Centennial_College_Academic_Integrity_M
odule_%202/story.html

Use of Lecture/Course Materials

Materials used in Centennial College courses are subject to Intellectual Property and Copyright
protection, and as such cannot be used and posted for public dissemination without prior permission from
the original creator or copyright holder (e.g., student/professor/the College/or third-party source). This
includes class/lecture recordings, course materials, and third-party copyright-protected materials (such as
images, book chapters and articles). Copyright protections are automatic once an original work is created,
and applies whether or not a copyright statement appears on the material. Students and employees are
bound by College policies, including AC100-22 Intellectual Property, and SL100-02 Student Code of
Conduct, and any student or employee found to be using or posting course materials or recordings for
public dissemination without permission and/or inappropriately is in breach of these policies and may be
sanctioned.

THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 5


CNET 331 CENTENNIAL COLLEGE Ethical Hacking

For more information on these and other policies, please visit www.centennialcollege.ca/about-
centennial/college-overview/college-policies.

Students enrolled in a joint or collaborative program are subject to the partner institution's academic
policies.

PLAR Process
This course is eligible for Prior Learning Assessment and Recognition (PLAR). PLAR is a process by
which course credit may be granted for past learning acquired through work or other life experiences. The
PLAR process involves completing an assessment (portfolio, test, assignment, etc.) that reliably
demonstrates achievement of the course learning outcomes. Contact the academic school to obtain
information on the PLAR process and the required assessment.

This course outline and its associated weekly topical(s) may not be reproduced, in whole or in
part, without the prior permission of Centennial College.

THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 6


CNET 331 CENTENNIAL COLLEGE Ethical Hacking

Topical Outline (subject to change):


Week Topics Readings/Materials Weekly Learning Outcome(s) Instructional Strategies Evaluation Evaluation
Name and Date
Weight
1 Introduction to Ethical Chapter 1 Information Security Overview Teacher-led instructions Week 1
Hacking Certified Ethical Hacker
(CEH) Version 11 Elements of Information Security Overview of the lab
work
Security Attacks

Cyber Kill Chain Concept

Phases of an Attack

Information Security Controls, Laws and


Standards

Types of Hackers
CLO 1-3,6
2 Footprinting and Chapter 2 Steganography and Steganalysis Professor-led Week 2
Reconnaissance Certified Ethical Hacker Instruction
(CEH) Version 11 Explain Footprinting Concepts
Lab 1 (Initiate)
Identify Footprinting through Search Engines
and Advanced Google Hacking Techniques Project
(Introduce)
Identify Footprinting through Web Services
and Social Networking Sites

Perform Website Footprinting, Email


Footprinting, and Competitive Intelligence

Explain WHOIS, DNS, and Network


Footprinting

Identify Footprinting through Social


Engineering

Identify different Footprinting Tools and


Countermeasures
CLO 1-4
3 Scanning Network Chapter 3 Understand Network Scanning Concepts Professor-led Lab 1 (4%) Lab 1 Due
Certified Ethical Hacker Instruction in Week 3

THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 7


CNET 331 CENTENNIAL COLLEGE Ethical Hacking

Week Topics Readings/Materials Weekly Learning Outcome(s) Instructional Strategies Evaluation Evaluation
Name and Date
Weight
(CEH) Version 11 Scanning Techniques and Host Discovery
Lab 2 (Initiate)
Perform OS Discovery

Scan beyond IDS and Firewall and Draw


Network Diagrams

Identify Port and Service Discovery


4 Enumeration Chapter 4 The Enumeration Phase Professor-led Lab 2 (4%) (Lab 2&
Certified Ethical Hacker Instruction Project
(CEH) Version 11 Categorize different Techniques for NetBIOS, Project Proposal )
SNMP, LDAP, NTP, SMTP, NFS, DNS Lab 3 (Initiate) Proposal (2%) Due in
Enumeration Week 4

Explain other Enumeration such as IPsec,


TELNET, FTP VOIP, and Linux/Unix
Enumeration

Identify different Enumeration


Countermeasures
CLO 7
5 Vulnerability Analysis Chapter 5 Define Vulnerability Research and Professor-led Lab 3 (3%) Lab 3 Due
Certified Ethical Hacker Vulnerability Classification Instruction in Week 5
(CEH) Version 11
Implement Vulnerability Assessment Lab 4 (Initiate)

Define Vulnerability Management Life Cycle


(Vulnerability Assessment Phases)

Implement different Approaches of


Vulnerability Assessment Solutions

Examine different Types of Vulnerability


Assessment Tools

Use Vulnerability Scoring Systems

Operate Vulnerability Assessment Tools

Interpret Vulnerability Assessment Reports


CLO 8

THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 8


CNET 331 CENTENNIAL COLLEGE Ethical Hacking

Week Topics Readings/Materials Weekly Learning Outcome(s) Instructional Strategies Evaluation Evaluation
Name and Date
Weight
6 System Hacking Chapter 6 Overview of CEH Hacking Methodology Professor-led Lab 4 (4%) Lab 4 Due
Certified Ethical Hacker Instruction in Week 6
(CEH) Version 11 Identify Techniques to Gain Access to the
System Lab 5 (Initiate)

Describe Privilege Escalation Techniques

Implement Techniques to Create and


Maintain Remote Access to the System

Password Cracking Countermeasures


7 System Hacking Chapter 6 Differentiate Types of Rootkits Professor-led Project Project
Certified Ethical Hacker Instruction Milestone Milestone
(CEH) Version 11 Explain Steganography and Steganalysis Report 1 (1%) Report 1
Techniques Lab 5 Due in
Week 7
Implement Techniques to Hide the Evidence
of Compromise
CLO 5,9
8 Topics of W1-W7 Assessment of WLO 1- Test 1 Test 1 (20%) Lab 5 Due
7 in Week 8
Lab 5 (4%)
9 Malware Threat Chapter 7 Understand Malware and Malware Professor-led Project Project
Certified Ethical Hacker Propagation Techniques Instruction Milestone Milestone
(CEH) Version 11 Report 2 (1%) Report 2
Identify Trojans, their Types, and how they Lab 6 (Initiate) Due in
Infect Systems Week 9

Understand Computer Worms versus Viruses

Explain the Malware Analysis Process

Identify different Techniques to Detect


Malware

Implement Different Malware


Countermeasures and penetration testing
CLO 10
10 Sniffing Chapter 8 Defining Ethernet Professor-led Lab 6 (4%) Lab 6 Due
Certified Ethical Hacker Instruction in Week 10
(CEH) Version 11 Explain Sniffing Concepts and various

THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 9


CNET 331 CENTENNIAL COLLEGE Ethical Hacking

Week Topics Readings/Materials Weekly Learning Outcome(s) Instructional Strategies Evaluation Evaluation
Name and Date
Weight
Sniffing Techniques Lab 7 (Initiate)

Defend against Various Sniffing Techniques

Identify various Sniffing Tools and Penetration


Testing
CLO 11
11 Social Engineering Chapter 9 The Basics of Social Engineering Professor-led Lab 7 (4%) Lab 7 Due
Certified Ethical Hacker Instruction in Week 11
(CEH) Version 11 The Phases of Social engineering
Lab 8 (Initiate)
Social Engineering Classifications and
Techniques

Social Engineering Countermeasures and


Penetration testing
CLO 10, 11
12 Denial of Service Chapter 10 Identify Denial of Service (DOS) and Professor-led Lab 8 (4%) Lab 8 &
Certified Ethical Hacker Distributed Denial of Service (DDOS) Instruction Project
(CEH) Version 11 Project Report Report Due
Identify different DOS/DDOS Techniques Lab 9 (Initiate) (8%) in Week 12

Explain Botnet Network

Identify various DOS and DDOS Attack Tools

Detect DOS and DDOS Attacks

Implement different DOS and DDOS


Countermeasures
13 Project Presentation Reading Material Project Presentation individual work, group Lab 9 (4%) Lab 9 &
W1-W12 work, technical report Project
CLO 1-12 preparation, student Project Presentatio
presentation and Presentation n Due in
demonstration, class (7%) Week 13
discussion
14 Topics W9-W12 Reading Material Test 2 Test 2 (20 %) Test 2 Week 14
W9-W12 CLO 1-11

THIS COURSE ADHERES TO ALL COLLEGE POLICIES (See College Calendar) 10

You might also like