Course Description
Encompasses in‐depth exploration of various methods for attacking and defending a network. Explores network security concepts from the viewpoint of hackers and their attack methodologies. Includes topics about hackers, attacks, Intrusion Detection Systems (IDS) malicious code, computer crime and industrial espionage.
General Course Purpose
This course introduces the student to the process and tools, including nmap and other port scanning tools, used to perform ethical hacking. A discussion of different network attacks, computer crime, and hacking is provided. The purpose of this course is to inform the student of common techniques used by attackers in order to increase awareness and assist the student learn how to effectively counter these attacks. This course also includes content, as indicated below in parenthesis behind each learning objective, which directly maps to DHS/NSA’s Center of Academic Excellence – 2 Year (CAE2Y) criteria. Please find the current information on NOVA's Cybersecurity Program.
Course Prerequisites/Corequisites
Prerequisites: ITN 260
Course Objectives
Upon completing the course, the student will be able to:
- Attacks (PTT)(VLA)
- Explain the professional hacker’s methodology for attacking a network.
- Explain the script kiddie’s methodology for attacking network.
- Explain network security vulnerabilities.
- Explain hackers, hacker techniques, tools and methodologies.
- Describe hacker motivation.
- Describe and perform network reconnaissance
- Describe and perform network mapping and scanning
- Describe and perform gaining access to a network.
- Describe and perform maintaining access to a network.
- Describe and perform covering tracks after gaining access to a network.
- Describe the Adversary Model (resources, capabilities, intent, motivation, risk aversion, access).
- Use a network mapping tool to identify open ports on a network.
- Malicious Code (CTH)
- Describe the general symptoms of a virus attack
- Differentiate between viruses and worms.
- Identify and describe the various categories of viruses and how they operate.
- Identify and describe the virus attack categories.
- Identify and describe the propagation of worms.
- Learn the terms and definitions associated with viruses, worms and malicious code.
- Describe the use of social engineering in the propagation of worms and viruses.
- Describe the operation of a macro virus.
- Define and describe the two basic approaches to antivirus software.
- Describe how to defend against a worm and virus attack.
- Computer Crime (CCR)
- Describe the steps in planning for a computer incident.
- Identify the difficulty in establishing who has jurisdiction over a computer crime.
- Understand the legal issues with regard to preserving digital evidence.
- Describe the various factors to consider in evaluating the financial loss due to a computer incident.
- Identify and describe the incident response goals and priorities.
- Describe the factors involved in identifying a computer incident.
- Describe and use the various tools associated with identifying an intruder.
- Specify the process for the initial response to an incident.
- Identify the various factors involved in assessing an incident.
- Identify the various types of documentation that should be examined in evaluating an incident.
- Describe how to handle and evaluate a computer incident.
- Recognize the role of law enforcement and rule of particularity in executing a search warrant.
- Describe the role the network security specialist would play in assisting the law enforcement and prosecution effort.
- Describe the difficulties in prosecuting a computer crime incident.
- Industrial Espionage (CCR)(ICS)
- Differentiate between competitive intelligence, economic intelligence, and industrial espionage.
- Differentiate between information, data, knowledge and intelligence.
- Specify the advantages of intelligence in industrial espionage.
- Describe the foreign intelligence organizations interested in economic intelligence and their general methodology.
- Describe Industrial Control Systems (ICS) and security issues associated with ICS and SCADA.
- Describe personnel countermeasure factors.
- Describe physical countermeasure factors.
- Describe technical countermeasure factors.
- Information Warfare (CSE)(PLE)
- Describe the history of warfare and its relationship to information warfare.
- Describe the historical factors that lead to information warfare.
- Explain the concerns of the US. Government with regard to the information infrastructure.
- Identify the spectrum of threats against the information infrastructure.
- Specify the role of offensive information warfare.
- Identify the types and roles of information warfare weapons.
- Specify the role of defensive information warfare.
- Explain the information assurance factors relating to defensive information warfare.
- Explain the military role in information warfare.
- Explain the civilian role in information warfare.
- Explain the law enforcement role in information warfare.