National University




General Course Information for CYB608: Ethical Hacking

Course: CYB608 - Ethical Hacking
Textbook: For the correct edition of the textbook assigned to a specific class, go to: http://www.nutextdirect.com

Course Prerequisite(s):
Course Description: This practicum focuses on the legal and regulatory requirements, ethical issues, basic methodology and technical tools used for ethical hacking and penetration tests. Students learn to establish a pre-test agreement with the enterprise, discover and exploit vulnerabilities, participate as a member of a pen test team and prepare a penetration test report.
Course Learning Outcomes:
  • Evaluate the legal and regulatory requirements of ethical hacking and penetration tests
  • Produce a penetration test authorization and rules of engagement document
  • Contrast penetration testing methodologies
  • Derive system reconnaissance and network scan to detect open ports and vulnerable systems
  • Elaborate social engineering techniques for a penetration test
  • Compile penetration test scanning results to exploit vulnerabilities
Specified Program Learning Outcomes:
  • Specialization in Computer Forensics
    • Assess, from both a national and global perspective, the relative demands of Internet-openness, legislation and law-enforcement, and individual right-to-privacy.(PLO 8)
    • Differentiate among the models, architectures, challenges and global legal constraints of secure electronic commerce technologies used to ensure transmission, processing and storage of sensitive information.(PLO 5)
    • Forecast the impact of continually advancing technology and national and international cyber-legislation on CSIA.(PLO 9)
    • Generate critical thinking in analysis and synthesis of enterprise and global CSIA issues through effective individual and team graduate-level written and oral assignments.(PLO 11)
    • Prescribe how to provide message privacy, integrity, authentication and non-repudiation using network security practices and infrastructure hardening techniques.(PLO 6)
    • Produce a successful project using project development skills.(PLO 12)
    • SPECIALIZATION: Create an application of forensic principles for SQL Server databases.
    • SPECIALIZATION: Derive a network usage history, identify and characterize event origins, and recreate the chronology of events.
    • SPECIALIZATION: Organize a functional forensic security tool kit.
  • Specialization in Ethical Hacking and Pen Testing
    • Conduct in-depth research into a specific CSIA topic, including finding and integrating relevant research results of others.[PLO10]
    • Devise a mitigation plan against both external and internal vulnerabilities to enterprise computer infrastructures and sensitive digital assets.(PLO2)
    • Forecast the impact of continually advancing technology and national and international cyber-legislation on CSIA.[PLO9]
    • Generate critical thinking in analysis and synthesis of enterprise and global CSIA issues through effective individual and team graduate-level written and oral assignments.[PLO11]
    • Integrate project development skills in producing a security system.[PLO12]
    • Integrate systems-level-infrastructure thinking into CSIA problem identification and resolution, and effectively communicate the solution.[PLO4]
    • SPECIALIZATION: Prepare and synthesize process specifications of Red Team actions against a Blue Team defense of a computer infrastructure.
    • SPECIALIZATION: Prepare and synthesize process specifications of a Blue Team defense used to protect the computer infrastructure against a Red Team attack
    • SPECIALIZATION: Produce a pen test authorization and rules of engagement document.
  • Specialization in Health Information Assurance
    • Assess, from both a national and global perspective, the relative demands of Internet-openness, legislation and law-enforcement, and individual right-to-privacy. (PLO 8)
    • Differentiate among the models, architectures, challenges and global legal constraints of secure electronic commerce technologies used to ensure transmission, processing and storage of sensitive information. (PLO 5)
    • Forecast the impact of continually advancing technology and national and international cyber-legislation on CSIA. (PLO 9)
    • Generate critical thinking in analysis and synthesis of enterprise and global CSIA issues through effective individual and team graduate-level written and oral assignments. (PLO 11)
    • Prepare a health information risk mitigation and security plan.
    • Prescribe how to provide message privacy, integrity, authentication and non-repudiation using network security practices and infrastructure hardening techniques. (PLO 6)
    • Prescribe information assurance requirements for health care.
    • Produce a successful project using project development skills. (PLO 12)
    • SPECIALIZATION: Propose information privacy policies that maintain the confidentiality of personal data in health care.
  • Specialization in Information Assurance and Security Policy
    • Assess, from both a national and global perspective, the relative demands of Internet-openness, legislation and law-enforcement, and individual right-to-privacy.(PLO 8)
    • Differentiate among the models, architectures, challenges and global legal constraints of secure electronic commerce technologies used to ensure transmission, processing and storage of sensitive information.(PLO5)
    • Forecast the impact of continually advancing technology and national and international cyber-legislation on CSIA.(PLO 9)
    • Generate critical thinking in analysis and synthesis of enterprise and global CSIA issues through effective individual and team graduate-level written and oral assignments.(PLO 11)
    • Prescribe how to provide message privacy, integrity, authentication and non-repudiation using network security practices and infrastructure hardening techniques.(PLO 6)
    • Produce a successful project using project development skills.(PLO 12)
    • SPECIALIZATION: Derive information assurance from an INFOSEC perspective.
    • SPECIALIZATION: Prepare an IT risk mitigation and security plan.
    • SPECIALIZATION: Prepare and create an enterprise disaster recovery and business continuity plan.

Students with Disabilities:
Students seeking special accommodations due to a disability must submit an application with supporting documentation, as explained under this subject heading in the General Catalog. Instructors are required to provide such accommodations if they receive written notification from the University.

Writing Across the Curriculum:
Students are expected to demonstrate writing skills in describing, analyzing and evaluating ideas and experiences. Written reports and research papers must follow specific standards regarding citations of an author's work within the text and references at the end of the paper. Students are encouraged to use the services of the University's Writing Center when preparing materials.

The following website provides information on APA, MLA, and other writing and citation styles that may be required for term papers and the like: http://nu.libguides.com/citations

National University Library:
National University Library supports academic rigor and student academic success by providing access to scholarly books and journals both electronically and in hard copy. Print materials may be accessed at the Library in San Diego or through document delivery for online and regional students. Librarians are available to provide training, reference assistance, and mentoring at the San Diego Library and virtually for online or regional students. Please take advantage of Library resources:

URL: http://www.nu.edu/library.

Contact the Library:

  • RefDesk@nu.edu
  • (858) 541-7900 (direct line)
  • 1-866-NU ACCESS x7900 (toll free)

Use the Library Training Tools (on the Library Homepage) for additional help

  • Recorded class presentations
  • Tutorials & Guides (APA/MLA, Peer-Review, and more)

Plagiarism:
Plagiarism is the presentation of someone else's ideas or work as one's own. Students must give credit for any information that is not either the result of original research or common knowledge. If a student borrows ideas or information from another author, he/she must acknowledge the author in the body of the text and on the reference page. Students found plagiarizing are subject to the penalties outlined in the Policies and Procedures section of the University Catalog, which may include a failing grade for the work in question or for the entire course. The following is one of many websites that provide helpful information concerning plagiarism for both students and faculty: http://www.indiana.edu/~wts/pamphlets/plagiarism.shtml

Ethics:
Ethical behavior in the classroom is required of every student. The course will identify ethical policies and practices relevant to course topics.

Technology:
Students are expected to be competent in using current technology appropriate for this discipline. Such technology may include word processing, spreadsheet, and presentation software. Use of the internet and e-mail may also be required.

Diversity:
Learning to work with and value diversity is essential in every class. Students are expected to exhibit an appreciation for multinational and gender diversity in the classroom.

Civility:
As a diverse community of learners, students must strive to work together in a setting of civility, tolerance, and respect for each other and for the instructor. Rules of classroom behavior (which apply to online as well as onsite courses) include but are not limited to the following:

  • Conflicting opinions among members of a class are to be respected and responded to in a professional manner.
  • Side conversations or other distracting behaviors are not to be engaged in during lectures, class discussions or presentations
  • There are to be no offensive comments, language, or gestures