CYB229 - Ethical Hacking Part 1
Course Description
This course provides training on penetration testing. Introduced topics include Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks, Enumeration, System Hacking, and Malware Threats.
This undergraduate course is 5 weeks.
PLEASE NOTE:
Attendance and participation are mandatory in all university courses, and specific requirements may differ by course. If attendance requirements are not met, a student may be removed from the course. Please review the Course Attendance Policy in the Catalog for more information.
Course Objectives
Week 1
- Define ethical hacking, its scope, and goals within an ethical framework.
- Describe vulnerability assessment and the significance of penetration testing.
- Define footprinting and reconnaissance, its scope, and methodology.
- Determine appropriate process for footprinting and reconnaissance.
- Conduct footprinting/reconnaissance using recognized tools and techniques.
Week 2
- Identify the role of scanning in vulnerability analysis.
- Differentiate scanning techniques and their appropriate tools.
- Draw the network topology based on scanning results.
- Evaluate strategies for scanning countermeasures and evasion.
Week 3
- Identify the role of enumeration in vulnerability analysis.
- Detail enumeration techniques and their appropriate tools.
- Summarize enumeration countermeasures.
- Conduct appropriate steps for enumeration for use in attack planning.
Week 4
- Explain ethical system hacking methodology, the stages of system hacking and their goals.
- Determine appropriate ethical hacking techniques and tools for cracking passwords, escalating privileges, and executing applications.
- Select ethical hacking techniques and tools appropriate for hiding files and covering tracks.
- Outline components of an attack plan.
Week 5
- Outline a penetration testing plan.
- Compare different types of malware.
- Explain malware analysis process.
- Describe techniques and tools to detect malware.
- Evaluate malware countermeasures.
Disclaimers
The University of Phoenix reserves the right to modify courses.
While widely available, not all programs are available to residents of all states. Please check with an Enrollment Representative.
Transferability of credit is at the discretion of the receiving institution. It is the student’s responsibility to confirm whether or not credits earned at University of Phoenix will be accepted by another institution of the student’s choice.
If you have a question contact us at 866-354-1800.
This course belongs to the following bundles offer:
- Certified Ethical Hacker Course Collection : Ethical Hacker