• Türkçe
  • English
Course Code: 
CYB 304
Course Period: 
Spring
P: 
3
Credits: 
3
ECTS: 
6
Course Language: 
İngilizce
Course Objectives: 
The goal of this course is to provide students with a survey of different aspects of attacks, penetration testing, policies and software, introduce ethical (White) hacking methods..
Course Content: 

Fundamentals of ethical hacking and security penetration testing, Cryptography protocols, authentication and security protocols, vulnerability scanning in systems, security reconnaisance using Kali Linux to perform buffer overflows, introduction to social engineering, reconnaissance, evasion and post exploitation corrective techniques.

Course Methodology: 
1: Lecture, 2: Question-Answer, 3: Discussion, 4: Lab Work
Course Evaluation Methods: 
A: Testing, B: Laboratory C: Homework D: Project

Vertical Tabs

Course Learning Outcomes

Learning Outcomes Program Learning Outcomes  Teaching Methods Assessment Methods
Information Systems graduates know the basic components of operating systems and networks. 3,6,9 1,3,4 A,B,C
Information Systems graduates know what the basic OS security threats are. 2,3,6,9 1,2,3,4 A,B,C
Information Systems graduates know what the basic security threats in networks are. 3,6,9 1,3,4 A,B,C
Knows security protocols and their implementation. 2,6,9 1,3,4 A,B,C
Knows how to take countermeasures against security threats and hacking. 3,6,9 1,3,4 A,B,C,D
Knows and implements cryptographic measures. 3,9,6 1,2,3,4 A,B,C,D
Knows and implements authentication measures 3,9 1,2,3,4 A,B,C,D
Knows ethical hacking 3,6,9 1,3,4 A, B, C, D

 

Course Flow

COURSE CONTENT
Week Topics Study Materials
1 Introduction to Ethical Hacking and Penetration Testing ACM 474
2 Kali Linux ACM 369
3 Passive and Active Reconnaisance ACM 361
4 Hacking networking devices and web applications ACM 361, ACM 363
5 Hacking user credentials ACM 361,369
6 Hacking databases ACM 211
7 MIDTERM EXAMINATION  
8 Buffer Overflows ACM 369
9  Powershell attacks ACM 369
10 Exploits in Windows and Linux Systems ACM 363, 369, 474
11 Physical security and social engineering ACM 474
12 Evasion and post exploitation corrective measures ACM 474,369
13 Persistence, Pivoting, and Data Exfiltration ACM 474
14 Cloud and Cloud Attacks ACM 369, 414
15 REVIEW AND MIDTERM EXAMINATION  

 

Recommended Sources

RECOMMENDED SOURCES
Textbook Weidman, Georgia, Penetration testing: a hands-on introduction to hacking No Starch Press, Inc. ISBN-13: 978-1-59327-564-8 (2014)

Patrick Engebretson, The Basics of hacking and penetration testing, Elsebier, ISBN 978-1-59749-655-1 (2011)

Additional Resources Baloch Rafay, Ethical Hacking and Penetration Testing guide, CRC Press, Boca Raton, FL, ISBN 13: 978-1-4822-3162-5 (2015)

 

 

Material Sharing

MATERIAL SHARING
Documents Presentations and Laboratory Sheets
Assignments Homework Sheets
Exams Old exam questions are furnished

 

Assessment

ASSESSMENT
IN-TERM STUDIES NUMBER PERCENTAGE
Mid-terms 2 66
Quizzes 4 16
Assignment and Labwork 10 18
Total   100
CONTRIBUTION OF FINAL EXAMINATION TO OVERALL GRADE   40
CONTRIBUTION OF IN-TERM STUDIES TO OVERALL GRADE   60
Total   100

 

Course’s Contribution to Program

No Program Learning Outcomes Contribution
1 Information Systems graduates have the knowledge and the skills to design and develop the complete systems for multi-media visual user interface. (ACM 262) 1 2 3 4 5
2 Information Systems graduates have advanced the knowledge and skills to design, develop and install the application systems for multi-media. (ACM365, 368,473)     x    
3 Information Systems graduates have the knowledge and the skills to design, develop and apply algorithms and data structures to solve the basic problems of information processing, within the framework of discrete mathematics (ACM 221,222).         X
4 Information Systems graduates have the knowledge and the skills to design and develop computer applications, based on user specificed requirements, using modern structured development tools and install them on various hardware platforms and deploy their usage.(ACM 311,322)       X  
5 Information Systems graduates have the knowledge and the skills to design and develop computer applications, based on user specificed requirements, using modern object-oriented development tools and install them on various hardware platforms and deploy their usage(ACM 321). X        
6 Information Systems graduates know the logic of computer operating systems, the basic set of system commands, how to control access to system resources by users of different departments and how to monitor the running of jobs in the system (ACM 369, 370).         X
7 Information Systems graduates have the knowledge and the skills to design and develop data models serving different requirements, database applications that would access and process data using various types of software, including queries, reports and business applications.(ACM 211, 364)   X      
8 Information Systems graduates have the knowledge and the skills to design and develop business applications that would provide data acess, modification and processing for data kept in enterprise database systems (ACM 221,364).          
9 Information Systems graduates have the knowledge about computer networks, and have  the skills to design,  develop and monitor  computer networks, how to configure them  and how to maintain their performance. (ACM 361, 362, 363, 463, 464)         X
10 Information Systems graduates have the knowledge and the skills to design and develop visual user interfaces for the web, web-based applications for n-tier client/server configurations, how to deploy them in enterprises (ACM 365, 368, 412).       x  

 

ECTS

ECTS ALLOCATED BASED ON STUDENT WORKLOAD BY THE COURSE DESCRIPTION
Activities Quantity Duration
(Hour)
Total
Workload
(Hour)
Course Duration (Including the exam week: 16x Total course hours) 16 3 48
Hours for off-the-classroom study (Pre-study, practice) 16 3 48
Mid-terms 2 2 4
Quizzes 4 1 4
Homework 10 3 30
Final examination 2 (Including reparation) 2 4
Total Work Load     138
Total Work Load / 25 (h)     5.52
ECTS Credit of the Course     6

 

None