10151164Penetration Testing
Course Information
Description
This course provides a broad overview of the tools and techniques commonly used for penetration testing. In depth hands-on exercises are used to instruct the student in the proper selection and application of a given tool for the intended task. Also included are basic strategies for documenting and reporting on the outcome of the test. The student must demonstrate the ability to plan, and execute a basic network security audit in an environment that simulates a common business or organization. Open Source tools include: NMap, Metasploit, Medusa, etc.
Total Credits
3

Course Competencies
  1. Summarize network operating systems
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment correctly
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about common phases of an attack
    you enter into class discussions about review of network concepts
    you enter into class discussions about review of linux concepts
    you enter into class discussions about review of windows concepts
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  2. Defend a network with reconnaissance techniques
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment correctly
    using a business scenario
    by examination
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about vulnerabilities and defenses of social engineering
    you enter into class discussions about vulnerabilities and defenses of physical break-in
    you enter into class discussions about gaining information about an organization
    you enter into class discussions about vulnerabilities and defenses of DNS (Domain Name System) servers
    you enter into class discussions about vulnerabilities and defenses of portals
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  3. Scan a network for vulnerabilities
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    using a business scenario
    by examination
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about vulnerabilities and defenses of wireless access points
    you enter into class discussions about vulnerabilities and defenses of modems
    you enter into class discussions about vulnerabilities and defenses of network mapping techniques
    you enter into class discussions about vulnerabilities and defenses of port scanners
    you enter into class discussions about vulnerabilities and defenses of UDP (User Datagram Protocol)
    you enter into class discussions about timing of an attack
    you enter into class discussions about vulnerabilities and defenses of firewall configuration
    you enter into class discussions about vulnerability scanning
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  4. Implement a plan to gain access an operating system
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about vulnerabilities and defenses of script kiddies exploits
    you enter into class discussions about vulnerabilities and defenses of buffer overflow exploits
    you enter into class discussions about vulnerabilities and defenses of exploitation engines
    you enter into class discussions about vulnerabilities and defenses of password attacks
    you enter into class discussions about vulnerabilities and defenses of web application attacks
    you enter into class discussions about vulnerabilities and defenses of SQL (Structured Query Language) injection
    you enter into class discussions about vulnerabilities and defenses of browser flaws
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  5. Implement a plan to gain access to a network
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about vulnerabilities and defenses of sniffer tools
    you enter into class discussions about vulnerabilities and defenses of port stealing
    you enter into class discussions about vulnerabilities and defenses of spoofing DNS (Domain Name System)
    you enter into class discussions about vulnerabilities and defenses of HTTPS and SSH
    you enter into class discussions about vulnerabilities and defenses of IP Address spoofing
    you enter into class discussions about vulnerabilities and defenses of host-based session hijacking
    you enter into class discussions about vulnerabilities and defenses of the netcat tool
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  6. Summarize a denial-of-service attack
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about vulnerabilities and defenses of denial-of-service attacks
    you enter into class discussions about vulnerabilities and defenses of SYN flood
    you enter into class discussions about vulnerabilities and defenses of smurf attacks
    you enter into class discussions about vulnerabilities and defenses of distributed denial-of-service attacks
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  7. Explain a plan to maintain access to a network
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about vulnerabilities and defenses of trojan horses
    you enter into class discussions about vulnerabilities and defenses of backdoors
    you enter into class discussions about vulnerabilities and defenses of spyware
    you enter into class discussions about vulnerabilities and defenses of BOTS (short for robot)
    you enter into class discussions about vulnerabilities and defenses of rootkits
    you enter into class discussions about vulnerabilities and defenses of kernel-mode rootkits
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  8. Summarize a plan to hide and cover the tracks of an attack
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about creating difficult-to-find files and directories
    you enter into class discussions about vulnerabilities and defenses of tunneling
    you enter into class discussions about vulnerabilities and defenses of altering event logs and accounting files
    you enter into class discussions about vulnerabilities and defenses of covert channels
    you enter into class discussions about vulnerabilities and defenses of steganography
    you attend class regularly
    you arrive for class on time
    you listen attentively during class

  9. Determine a plan to protect your network from vulnerabilities
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about protecting against common mistakes in network defense
    you arrive for class on time
    you listen attentively during class
    you attend class regularly

  10. Summarize the future of penetration testing and network defense
    Assessment Strategies
    by participating in the class
    by completing lab manual assignment
    by examination
    using a business scenario
    Criteria
    you complete your lab manual assignment correctly
    you enter into class discussions about methods to keep up with new tools, exploits, and vulnerabilities
    you enter into class discussions about network defense content in mailing lists, websites, conferences
    you attend class regularly
    you arrive for class on time
    you listen attentively during class