INSE 435 Hacker Tools and Techniques

Discover the history of hacking and understand the difference between ethical and black-hat hacking in this course. Examine how attackers target networks and the methods they use including footprinting, port scanning, enumeration, malware, sniffers, denial of service, and social engineering. The course provides concepts in incident response, defensive technologies and common approaches to defense. Concepts are reinforced through hands-on labs.

Credits

5

Prerequisite

All Technology Core courses

Washington Technology University

Syllabus

INSE 435 : Hacker Tools and Techniques

5 Credits

Approved: 12/2/2021 2:17:09 PM

Course Description

Discover the history of hacking and understand the difference between ethical and black-hat hacking in this course. Examine how attackers target networks and the methods they use including footprinting, port scanning, enumeration, malware, sniffers, denial of service, and social engineering. The course provides concepts in incident response, defensive technologies and common approaches to defense. Concepts are reinforced through hands-on labs.

Course Required Resources

  • Textbook: Oriyano & Solomon. Hacker Techniques, Tools, and Incident Handling, Third Edition, Burlington, MA: Jones & Bartlett, 2018. 
  • Course supplements: Weidman. Penetration Testing – A Hands-on Introduction to Hacking. No Starch Press, 2014 (available in Books 24x7)

Course Keywords

Ethical hacking, Ethical laws, Exploitation, Hacker, Penetration testing, Kali Linux, Footprinting, Information gathering,  Fingerprinting, Nmap, TCP/IP, Botnet, DoS, DDoS, Network sniffing, Network traffic analysis, Wireshark, Session hijacking, Enumeration, Password cracking, Privilege escalation, Rainbow table, Rootkit, Backdoors, Ps tools, System hacking, Buffer overflow, Cross-site scripting (XSS) attack, Database attack, SQL injection, Trojan, Virus, Worm, Adware, Covert channel, Malware, Ransomware, 802.11, Wi-Fi, WLAN, WPA, WPA2, WEP, Bluejacking, Bluesnarfing, Bluetooth, Social engineering, BCP, BIA, DRP, Forensics, Incident response plan, Incident response process, Defense in depth, Demilitarized zone (DMZ), Firewall, Honeynet, Honeypot, IDS, IPS, Security control