Search Results for "IT 0145"

IT 0145. Introduction to Cybersecurity: Ethical Hacking

Units: 3
Formerly known as CIS 152
Prerequisite: Completion of IT 120 with grade of "C" or better
Advisory: Completion of CSCI 50 with grade of "C" or better
Hours: 72 (54 lecture, 18 laboratory)
Immerses IT Professionals in hands-on intensive environment providing in-depth knowledge and experience with current essential security systems. Provides understanding of perimeter defenses and leads to scanning and attacking networks; no real networks are harmed. Students learn how intruders escalate privileges and the steps to be taken to secure a system. Also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virtual Creation. Focus includes legal and regulatory requirements, ethical issues, basic methodology and technical tools used for ethical hacking and penetration tests. Students establish a pre-test agreement with the enterprise, discover and exploit vulnerabilities, participate as a member of a pen test team and prepare a penetration test report. (CSU)

IT 0145 - Introduction to Cybersecurity: Ethical Hacking

https://catalog.sierracollege.edu/course-outlines/it-0145/
Catalog Description Formerly known as CIS 152 Prerequisite: Completion of IT 120 with grade of "C" or better Advisory: Completion of CSCI 50 with grade of "C" or better Hours: 72 (54 lecture, 18 laboratory) Description: Immerses IT Professionals in hands-on intensive environment providing in-depth knowledge and experience with current essential security systems. Provides understanding of perimeter defenses and leads to scanning and attacking networks; no real networks are harmed. Students learn how intruders escalate privileges and the steps to be taken to secure a system. Also covers Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virtual Creation. Focus includes legal and regulatory requirements, ethical issues, basic methodology and technical tools used for ethical hacking and penetration tests. Students establish a pre-test agreement with the enterprise, discover and exploit vulnerabilities, participate as a member of a pen test team and prepare a penetration test report. (CSU) Course Student Learning Outcomes CSLO #1: Research, analyze and evaluate information to solve business problems using cybersecurity ethical hacking concepts and software. CSLO #2: Design and produce cybersecurity ethical hacking solutions incorporating current trends, security, and best practices. CSLO #3: Employ cybersecurity ethical hacking concepts and terminology in professional communication. CSLO #4: Demonstrate marketable cybersecurity ethical hacking career skills. Effective Term Fall 2025 Course Type Credit - Degree-applicable Contact Hours 72 Outside of Class Hours 90 Total Student Learning Hours 162 Course Objectives Provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Students will learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also covered is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. General Education Information Approved College Associate Degree GE Applicability CSU GE Applicability (Recommended-requires CSU approval) Cal-GETC Applicability (Recommended - Requires External Approval) IGETC Applicability (Recommended-requires CSU/UC approval) Articulation Information CSU Transferable Methods of Evaluation Objective Examinations Example: Based upon course readings and class discussions relating vulnerability findings and exploitation, students would be required to take a quiz relating to chapter content, and to explain issues pertaining to vulnerabilities and exploits. Example: In your own words (no copy/paste allowed) identify vulnerabilities in a system and take advantage of that vulnerability. Instructor will grade based on level of understanding shown in the response. Problem Solving Examinations Example: Students will be provided with a virtualized environment with various operating systems to exploit. Students would have to determine the right tool to use for the system being tested. Students would also have to analyze the output of various security tools utilized during this engagement. Pass/Fail grading. Projects Example: Given a specific scenario, students would be required to prepare a Penetration Testing report. Student performance would be based upon a rubric designed to incorporate both the requirements of a Pentest report, as identified course readings, and the clearness of plan response instructions. Skill Demonstrations Example: Students will be provided lab assignments based on the weekly topic and required to complete the tasks outlined. See the lab example in 14b for sample. Example: Students will attempt to exploit systems and discuss their process. Students will capture images to show the process and submit for grading. Grading will be based on a complete set of images with proper notations as described in the instructions. Pass/Fail grading. Repeatable No Methods of Instruction Laboratory Lecture/Discussion Distance Learning Lab: Instructor will guide students through hands-on lab exercise to test systems for vulnerabilities and exploit those vulnerabilities utilizing tools and techniques discussed in class. (Objectives 11-14) Lecture: Students will read weekly assignments related to exploiting system vulnerabilities. The instructor will lead a review discussion on the topics covered. (Objective 11) Distance Learning Following an online instructor lecture on penetration testing standards and policies, students will be provided with a written scenario, outlining a company's penetration testing standard and policies and will test an assets security to that policy. (Objective 24) Typical Out of Class Assignments Reading Assignments 1. Students read from the course text. For example, students read the textbook chapter on Analyzing Vulnerability Scans and answer end of chapter questions. 2. Students perform vulnerability scans in an isolated lab environment and analyze and exploit systems based on findings Writing, Problem Solving or Performance Example 1: Students will utilize Kali Linux tools to test the security of operating systems and network environments Example 2: Detail the specific differences between a vulnerability scan and a penetration test. Students will also discuss use case between the two scenarios. Other (Term projects, research papers, portfolios, etc.) Required Materials CompTIA PenTest+ Study Guide: Exam PT0-002 Author: David Seidl Publisher: Sybex Publication Date: 2021 Text Edition: 2nd Classic Textbook?: No OER Link: OER: Other materials and-or supplies required of students that contribute to the cost of the course.

Information Technology

https://catalog.sierracollege.edu/departments/infotech/
Information Technology programs prepare students for a wide array of Information Technology (IT) career paths. IT encompasses computer professional careers and positions, from Tech Support to Cyber Security, and from Office Work to Business Analyst. Careers in IT deal with the design, creation, management, maintenance, and business use of the varied components of computer systems, including software, hardware, networks, and the cloud. The field spans a broad range of industries, including technology, healthcare, finance, retail, government and education; and includes jobs that involve business computer applications, databases, technical and customer support services, web authoring/developing, Internet information research, network administration, and cybersecurity. Some courses prepare students for industry certifications such as CompTIA’s, A+, Network+, Security+, or Microsoft’s MSCE. The curriculum also provides valuable computer experience and training for students who are enrolled in other disciplines of the College.