Ethical Hacking and Reverse Engineering   (2 Units C: LH 15; PH 45) 

Course Contents 

Introduction to ethical hacking, attacks, threats, hackers, measures and countermeasures. Overview of ethical hacker strategies. Focus on how perimeter defenses work, how intruders escalate privileges and methods of security systems. Intrusion detection, policy creation, social engineering. Techniques and technologies for understanding the operation of malicious software and attacks. Threats and defence mechanisms. Attack phases. Secure network infrastructure. DDoS attacks, buffer overflows and virus creation. Network Infrastructure Attacks, Hacking Methodology, Developing ethical hacking plans. Foot printing and reconnaissance. Scanning Networks. Enumeration and system hacking. Malware threats. Sniffing. Social engineering. Physical security. Password vulnerabilities - cracking passwords. Denial of Service. Session hijacking. Hacking web servers. Hacking web applications. sql injection, hacking wireless networks. Hacking mobile platforms. Evading IDS, Firewalls, and Honeypots. Explores techniques and technologies for understanding the operation of malicious software and attacks. Techniques for detection, identification and prevention. Reverse engineering of code and network exploits as a method for understanding and development of countermeasures.

Lab work: Practice the ethical hacker strategies and methods. Work on a sample perimeter defenses and identify how intruders escalate privileges and methods of security systems. Practical exercises on the techniques and technologies of malicious software and attacks. Learn how to perform system hacking, mobile platform hacking, crack password, remove introduced vulnerabilities and evade IDs, firewalls, and honeypots. Apply reverse engineering of code and network exploits as a method for understanding and development of countermeasures. Utilize foot printing and reconnaissance, and scanning networks.