Prerequisite Courses:
Course Language:
İngilizce
Course Objectives:
The goal of this course is to provide students with a survey of different aspects of attacks, penetration testing, policies and software, introduce ethical (White) hacking methods..
Course Content:
Fundamentals of ethical hacking and security penetration testing, Cryptography protocols, authentication and security protocols, vulnerability scanning in systems, security reconnaisance using Kali Linux to perform buffer overflows, introduction to social engineering, reconnaissance, evasion and post exploitation corrective techniques.
Course Methodology:
1: Lecture, 2: Question-Answer, 3: Discussion, 4: Lab Work
Course Evaluation Methods:
A: Testing, B: Laboratory C: Homework D: Project
Vertical Tabs
Course Learning Outcomes
Learning Outcomes | Program Learning Outcomes | Teaching Methods | Assessment Methods | ||||||
Information Systems graduates know the basic components of operating systems and networks. | 3,6,9 | 1,3,4 | A,B,C | ||||||
Information Systems graduates know what the basic OS security threats are. | 2,3,6,9 | 1,2,3,4 | A,B,C | ||||||
Information Systems graduates know what the basic security threats in networks are. | 3,6,9 | 1,3,4 | A,B,C | ||||||
Knows security protocols and their implementation. | 2,6,9 | 1,3,4 | A,B,C | ||||||
Knows how to take countermeasures against security threats and hacking. | 3,6,9 | 1,3,4 | A,B,C,D | ||||||
Knows and implements cryptographic measures. | 3,9,6 | 1,2,3,4 | A,B,C,D | ||||||
Knows and implements authentication measures | 3,9 | 1,2,3,4 | A,B,C,D | ||||||
Knows ethical hacking | 3,6,9 | 1,3,4 | A, B, C, D |
Course Flow
COURSE CONTENT | ||
Week | Topics | Study Materials |
1 | Introduction to Ethical Hacking and Penetration Testing | ACM 474 |
2 | Kali Linux | ACM 369 |
3 | Passive and Active Reconnaisance | ACM 361 |
4 | Hacking networking devices and web applications | ACM 361, ACM 363 |
5 | Hacking user credentials | ACM 361,369 |
6 | Hacking databases | ACM 211 |
7 | MIDTERM EXAMINATION | |
8 | Buffer Overflows | ACM 369 |
9 | Powershell attacks | ACM 369 |
10 | Exploits in Windows and Linux Systems | ACM 363, 369, 474 |
11 | Physical security and social engineering | ACM 474 |
12 | Evasion and post exploitation corrective measures | ACM 474,369 |
13 | Persistence, Pivoting, and Data Exfiltration | ACM 474 |
14 | Cloud and Cloud Attacks | ACM 369, 414 |
15 | REVIEW AND MIDTERM EXAMINATION |
Recommended Sources
RECOMMENDED SOURCES | |
Textbook |
Weidman, Georgia, Penetration testing: a hands-on introduction to hacking No Starch Press, Inc. ISBN-13: 978-1-59327-564-8 (2014)
Patrick Engebretson, The Basics of hacking and penetration testing, Elsebier, ISBN 978-1-59749-655-1 (2011) |
Additional Resources |
Baloch Rafay, Ethical Hacking and Penetration Testing guide, CRC Press, Boca Raton, FL, ISBN 13: 978-1-4822-3162-5 (2015)
|
Material Sharing
MATERIAL SHARING | |
Documents | Presentations and Laboratory Sheets |
Assignments | Homework Sheets |
Exams | Old exam questions are furnished |
Assessment
ASSESSMENT | ||
IN-TERM STUDIES | NUMBER | PERCENTAGE |
Mid-terms | 2 | 66 |
Quizzes | 4 | 16 |
Assignment and Labwork | 10 | 18 |
Total | 100 | |
CONTRIBUTION OF FINAL EXAMINATION TO OVERALL GRADE | 40 | |
CONTRIBUTION OF IN-TERM STUDIES TO OVERALL GRADE | 60 | |
Total | 100 |
Course’s Contribution to Program
No | Program Learning Outcomes | Contribution | ||||
1 | Information Systems graduates have the knowledge and the skills to design and develop the complete systems for multi-media visual user interface. (ACM 262) | 1 | 2 | 3 | 4 | 5 |
2 | Information Systems graduates have advanced the knowledge and skills to design, develop and install the application systems for multi-media. (ACM365, 368,473) | x | ||||
3 | Information Systems graduates have the knowledge and the skills to design, develop and apply algorithms and data structures to solve the basic problems of information processing, within the framework of discrete mathematics (ACM 221,222). | X | ||||
4 | Information Systems graduates have the knowledge and the skills to design and develop computer applications, based on user specificed requirements, using modern structured development tools and install them on various hardware platforms and deploy their usage.(ACM 311,322) | X | ||||
5 | Information Systems graduates have the knowledge and the skills to design and develop computer applications, based on user specificed requirements, using modern object-oriented development tools and install them on various hardware platforms and deploy their usage(ACM 321). | X | ||||
6 | Information Systems graduates know the logic of computer operating systems, the basic set of system commands, how to control access to system resources by users of different departments and how to monitor the running of jobs in the system (ACM 369, 370). | X | ||||
7 | Information Systems graduates have the knowledge and the skills to design and develop data models serving different requirements, database applications that would access and process data using various types of software, including queries, reports and business applications.(ACM 211, 364) | X | ||||
8 | Information Systems graduates have the knowledge and the skills to design and develop business applications that would provide data acess, modification and processing for data kept in enterprise database systems (ACM 221,364). | |||||
9 | Information Systems graduates have the knowledge about computer networks, and have the skills to design, develop and monitor computer networks, how to configure them and how to maintain their performance. (ACM 361, 362, 363, 463, 464) | X | ||||
10 | Information Systems graduates have the knowledge and the skills to design and develop visual user interfaces for the web, web-based applications for n-tier client/server configurations, how to deploy them in enterprises (ACM 365, 368, 412). | x |
ECTS
ECTS ALLOCATED BASED ON STUDENT WORKLOAD BY THE COURSE DESCRIPTION | |||
Activities | Quantity |
Duration (Hour) |
Total Workload (Hour) |
Course Duration (Including the exam week: 16x Total course hours) | 16 | 3 | 48 |
Hours for off-the-classroom study (Pre-study, practice) | 16 | 3 | 48 |
Mid-terms | 2 | 2 | 4 |
Quizzes | 4 | 1 | 4 |
Homework | 10 | 3 | 30 |
Final examination | 2 (Including reparation) | 2 | 4 |
Total Work Load | 138 | ||
Total Work Load / 25 (h) | 5.52 | ||
ECTS Credit of the Course | 6 |
None