2023-24 University Bulletin 
    
    May 16, 2024  
2023-24 University Bulletin [ARCHIVED CATALOG]

CSC (0145) 665 - Cybersecurity Techniques


Credits: 3.00

Students will learn cyber-offensive methods and techniques commonly seen in ethical hacking scenarios and cover topics from reconnaissance and scanning to exploitation, privilege escalation, and pivoting attacks. Specific attention is given to attacking web applications using injection techniques, session management, direct object reference, and information disclosure.

Course Learning Goals: After completing this course students will be able to:
O1: Use network and vulnerability scanning tools to identify potential exposures on a network and formulate hypotheses for attacking them
O2: Execute attacks against password-based authentication mechanisms and assess the security of authentication schemes
O3: Explain the different criteria used to categorize malware and interpret malware descriptions to create risk assessments
O4: Use exploit frameworks such as the Metasploit Framework to execute attacks relying on known vulnerabilities in software
O5: Assess web applications for insecurities and attack vulnerabilities in web applications
O6: Assess application source code for vulnerabilities, perform black box assessment of programs to find potential application security weaknesses
O7: Assess system configuration files to determine risk exposure and interpret system logs to identify signs of compromise
O8: Write scripts supporting security-related activities in the Bash programming Language and in Powershell
O9: Participate in Capture-the-Flag activities
O10: Build and use a public-key infrastructure, and use compromised key material to decrypt intercepted network connections