Wednesday, December 3, 2008

SYLLABUS: Hacker Techniques, Tools and Incident Handling

Instructor: Mr. Beard
Office hours: TBD
Class hours: As Scheduled

COURSE DESCRIPTION
This course is an introduction to hacking tools and incident handling. Areas of instruction include
various tools and vulnerabilities of operating systems, software and networks used by hackers to
access unauthorized information. This course also addresses incident handling methods used when
information security is compromised.

COURSE OBJECTIVES
After successful completion of this course, the student will have the opportunity to:
1. Identify the classes of hackers and the ethical use of penetration analysis tools.
2. Describe the environments where network security is applied.
3. Identify classes of network monitoring and management tools as they relate to network
security.
4. Identify multiple classes of computer and network vulnerabilities.
5. Conduct network footprinting.
6. Describe tools used to test for multiple types of computer and network vulnerabilities.
7. Evaluate the role penetration testing plays in demonstrating the existence of network
vulnerabilities.
8. Explain the evolution of computer crime legislation.
9. Describe the best practices to protect networks and hosts.
10. Apply the provision of National Institute of Standards and Technology (NIST)
publications SP 800-42 and SP 800-35.
11. Explore ITT Tech Virtual Library to describe hacker related incidents and computer
vulnerabilities.
Related SCANS Objectives
1. Troubleshoot the problems in the security architecture of an organization.
2. Demonstrate how components of a network interact within and outside the network,
applying technical skills.
3. Evaluate the set of procedures, tools, or computers and their programs that will create
secure network architecture for an organization.
4. Create secure network architecture for an organization.
5. Identify the knowledge of security requirements of the organization with the best
application of information assurance practices.
6. Classify the availability, integrity and confidentiality of data in an orderly manner to
ensure the specific secure requirements of the organization.
7. Acquire security related data and evaluate it for the purpose of implementing secure
network architecture for an organization.
8. Interpret security data, which effectively communicate the justification of related security
information.
9. Process security configurations using computers.
10. Solve security issues as a member of an information technology team.
11. Evaluate a decision regarding security structure of the organization and other related
problems through negotiation with others.
COURSE RESOURCES
Student Textbook Package
􀂄 Simpson, Michael T. Hands-On Ethical Hacking and Network Defense. Thomson
Course Technology, 2006.
References and Resources
ITT Tech Virtual Library
Log on to the ITT Tech Virtual Library— http://www.library.itt-tech.edu/
—to access the online books, journals, and other reference resources selected to support ITT Tech curriculums.
􀂄 General References
• >Program Links>Professional Organizations
• >Program Links>Recommended Links

EVALUATION & GRADING
COURSE REQUIREMENTS
1. Attendance and Participation
Regular attendance and participation are essential for satisfactory progress in this course.
2. Completed Assignments
Each student is responsible for completing all assignments on time.
3. Team Participation, if applicable
Each student is responsible for participating in team assignments and for completing the delegated task. Each team member must honestly evaluate the contributions by all members of their respective teams.

Evaluation Criteria Table
The final grade will be based on the following weighted categories:
Category Weight
Participation 10%
Writing Assignments 15%
Research Assignments 10%
Lab Assignments 25%
Project 1 5%
Project 2 10%
Final Exam 25%