| |
May 01, 2026
|
|
|
|
|
CYS 4590 - CAPSTONE - ETHICAL HACKING credits: 3.0 To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You will be prepped with tools to launch these offensive tactics, and then complete a hands-on project where they are asked to ethically hack a real system. This online class has optional live sessions. Hackers: Students learn the differences between white hat, black hat, and grey hat hackers, as well as the important role that white hat hackers play in securing networks/systems. Operating Systems: Students study the industry standard operating systems and open- source tools used most commonly by white hat hackers. Penetration Testing: Penetration testing is the act of executing simulated attacks to ensure the safety of a network. Students will learn how to perform these tests to identify vulnerabilities of networks and other systems. Vulnerabilities: Identifying vulnerabilities is critical to ethical hacking, as it provides information on what components of systems need to be hardened to attacks. Students will become familiar with the most common vulnerabilities and how those vulnerabilities are exploited. Objectives: A) Ethically hack or test the security of networks and systems and subsequently patch any gaps in security to mitigate real attacks; B) Distinguish between the different types of hackers and understand the vital role that white hat (ethical) hackers play in keeping networks and systems secure; C) Ethically hack their own computer and other personal systems by: Conducting network penetration testing to identify vulnerabilities. Exploit the identified vulnerabilities and gain access; D) Control devices post exploitation; E) Use various tools to carry our client-side and server-side attacks. Protect your computer and other systems to mitigate real attacks; F) Install and use the operating systems and software/tools needed to identify vulnerabilities and gain initial access to networks/systems. Method of Evaluation: Onboarding Assignments 50 5%; Weekly Assignment 120 (12 x 10) 12%; Participation 150 (10 x 15) 15%; Quizzes 120 (6 x 20) 12%; Labs 250 (5 x 50) 25%; Final Project (Part 1: Proposal, Part 2: Draft, Part 3: Final, Presentation) 310 (50, 70, 110, 80) 31%.
Prerequisite(s): CYS 3010
Add to Favorites (opens a new window)
|
|