INFO70049
Ethical Hacking and Network Defense
Sheridan
 
  I: Administrative Information   II: Course Details   III: Topical Outline(s)  Printable Version
 

Land Acknowledgement

Sheridan College resides on land that has been, and still is, the traditional territory of several Indigenous nations, including the Anishinaabe, the Haudenosaunee Confederacy, the Wendat, and the Mississaugas of the Credit First Nation. We recognize this territory is covered by the Dish with One Spoon treaty and the Two Row Wampum treaty, which emphasize the importance of joint stewardship, peace, and respectful relationships.

As an institution of higher learning Sheridan embraces the critical role that education must play in facilitating real transformational change. We continue our collective efforts to recognize Canada's colonial history and to take steps to meaningful Truth and Reconciliation.


Section I: Administrative Information
  Total hours: 42.0
Credit Value: 3.0
Credit Value Notes: N/A
Effective: Winter 2021
Prerequisites: N/A
Corequisites: N/A
Equivalents: N/A
Pre/Co/Equiv Notes: N/A

Program(s): Cybersecurity - Legal & Ethic
Program Coordinator(s): N/A
Course Leader or Contact: N/A
Version: 20210118_00
Status: Approved (APPR)

Section I Notes: This is a course offered through OntarioLearn. Access to the course materials will be through OntarioLearn.com and you will be sent an email with your login details.

 
 
Section II: Course Details

Detailed Description
This course prepares students to assess and then correct vulnerabilities present within information systems. Students are introduced to tools and penetration testing methodologies used by ethical hackers. What and who ethical hackers are and how they protect corporate and government data from cyber-attacks is discussed. Methods and tools used in attacks and their countermeasures as well as available security resources and "attack type" systems are also investigated.

Program Context

 
Cybersecurity - Legal & Ethic Program Coordinator(s): N/A
This is a mandatory course in the Legal and Ethical Policies and Procedures Recognition of Achievement.


Course Critical Performance and Learning Outcomes

  Critical Performance:
N/A
 
Learning Outcomes:

To achieve the critical performance, students will have demonstrated the ability to:

  1. Identify the role of Ethical Hacking in today's network security environment.
  2. Identify the TCP/IP protocol stack.
  3. Describe different types and methods of malicious software, viruses, malware attacks, network attacks, physical security attacks and vulnerabilities.
  4. Identify tools for footprinting, DNS zone transfers and current types of social engineering.
  5. Select port scanning tools and produce port scanning reports.
  6. Describe and demonstrate the enumeration of current operating systems.
  7. Use basic programming concepts.
  8. Describe vulnerabilities and techniques to harden current operating systems.
  9. Identify embedded systems, where they are used and vulnerabilities associated with them.
  10. Describe web applications, their vulnerabilities and the tools used to attack them.
  11. Identify type and uses of wireless technology and wireless standards.
  12. Describe terms related to cryptography and cryptanalysis.
  13. Identify and describe network protection systems.

Evaluation Plan
Students demonstrate their learning in the following ways:

 Evaluation Plan: ONLINE
 Labs35.0%
 Quizzes (2 x 20%)40.0%
 Final Exam25.0%
Total100.0%

Provincial Context
The course meets the following Ministry of Colleges and Universities requirements:


 

Prior Learning Assessment and Recognition
PLAR Contact (if course is PLAR-eligible) - Office of the Registrar
Students may apply to receive credit by demonstrating achievement of the course learning outcomes through previous relevant work/life experience, service, self-study and training on the job. This course is eligible for challenge through the following method(s):

  • Other
    Notes:  This course is delivered through OntarioLearn and hosted by Seneca College. Access to this course is through OntarioLearn website.

 
 
Section III: Topical Outline
Some details of this outline may change as a result of circumstances such as weather cancellations, College and student activities, and class timetabling.
Instruction Mode: Online
Professor: N/A
Resource(s):
 TypeDescription
RequiredTextbookGray Hat Hacking: The Ethical Hacker's Handbook, Daniel Regalado, McGraw Hill, 5th, ISBN 9781260108415

Applicable student group(s): Continuing Education Online Students
Course Details:
  • Role of Ethical Hacking in today’s network security environment

  • TCP/IP protocol stack

  • Types and methods of malicious software, viruses, malware attacks, network attacks, physical security attacks and vulnerabilities

  • Tools for footprinting, DNS zone transfers and current types of social engineering

  • Port scanning tools and reports

  • Enumeration of current operating systems

  • Basic programming concepts

  • Vulnerabilities and techniques to harden current operating systems

  • Embedded systems

  • Web application vulnerabilities

  • Types of wireless technology and standards

  • Cryptography and cryptanalysis

  • Network protection systems



Sheridan Policies

It is recommended that students read the following policies in relation to course outlines:

  • Academic Integrity
  • Copyright
  • Intellectual Property
  • Respectful Behaviour
  • Accessible Learning
All Sheridan policies can be viewed on the Sheridan policy website.

Appropriate use of generative Artificial Intelligence tools: In alignment with Sheridan's Academic Integrity Policy, students should consult with their professors and/or refer to evaluation instructions regarding the appropriate use, or prohibition, of generative Artificial Intelligence (AI) tools for coursework. Turnitin AI detection software may be used by faculty members to screen assignment submissions or exams for unauthorized use of artificial intelligence.

Course Outline Changes: The information contained in this Course Outline including but not limited to faculty and program information and course description is subject to change without notice. Nothing in this Course Outline should be viewed as a representation, offer and/or warranty. Students are responsible for reading the Important Notice and Disclaimer which applies to Programs and Courses.


[ Printable Version ]

Copyright © Sheridan College. All rights reserved.