May 29, 2024  
2023-2024 College Catalog and Student Handbook 
    
2023-2024 College Catalog and Student Handbook
Add to Portfolio (opens a new window)

ITEC 2430 - Open Source Security Tools (OSST)


Academic Division:

Business, Industry and Technology


Academic Discipline:

Information Technology


Assistant Dean: Vincent Palombo PhD
3 Credit(s)
One way to achieve sound defensive security is through an offensive mindset. This course introduces open source security tools with a focus on Kali Linux. Students will learn about open source security tools and how to exploit these technologies effectively-both offensively and defensively. A variety of open source tools will be demonstrated covering topics such as: Vulnerability Analysis, Wireless Attacks, Forensic Tools, Stress Testing, Sniffing & Spoofing, Hardware Hacking, and more. Through a series of progressively more difficult labs, students will utilize open source security tools to defend and attack both simulated and actual networks. UG
2 Lab Hour(s)
2 Lecture Hour(s);
Required as Prerequisite or Concurrent Course(s): Take ITEC 2410 ; Minimum Grade C-;




College Wide Outcomes
College-Wide Learning Outcomes Assessments - - How it is met & When it is met
Communication – Written  
Communication – Speech  
Intercultural Knowledge and Competence  
Critical Thinking  
Information Literacy  
Quantitative Literacy  


Student Learning Outcomes for Course
Outcomes Assessments – How it is met & When it is met

1. Describe information gathering and vulnerability analysis techniques.

Weeks 1-3 tests, labs, midterm and final exam.

2. Explain web applications security exploits.

Weeks 2-4 tests, labs, midterm and final exam.

3. Describe wireless attacks and defenses.

Week 4 tests, labs, midterm and final exam.

4. Demonstrate exploitation and forensic tools for a given set of conditions.

Weeks 5-7 tests, labs, midterm, and final exam.

5. Explain the fundamentals aspects and associated techniques of maintaining access.

Week 8 tests, labs, midterm and final exam.

6. Demonstrate hardware hacking techniques for a given set of conditions.

Weeks 10-11 tests, labs, and final exam.

7. Describe sniffing and spoofing attacks and remediation techniques.

Weeks 11-12 tests, labs, and final exam.

8. Demonstrate password attacks for a given set of conditions.

Weeks 12 -13 tests, labs, and final exam.

 



Standard Grading Scale
93-100      A

90 - 92      A-

87- 89       B+

83 - 86      B

80 -82       B-

77- 79       C+

73 - 76      C

70 -72       C-

67- 69       D+

63 - 66      D

60 -62       D-

00- 59       F


Statement on Diversity
North Central State College believes that every student is a valued and equal member of the community.*  Every student brings different experiences to the College, and all are important in enriching academic life and developing greater understanding and appreciation of one another. Therefore, NC State College creates an inclusive culture in which students feel comfortable sharing their experiences. Discrimination and prejudice have no place on the campus, and the College takes any complaint in this regard seriously. Students encountering aspects of the instruction that result in barriers to their sense of being included and respected should contact the instructor, assistant dean, or dean without fear of reprisal. 

*Inclusive of race, color, religion, gender, gender identity or expression, national origin (ancestry), military status (past, present or future), disability, age (40 years or older), status as a parent during pregnancy and immediately after the birth of a child, status as a parent of a young child, status as a foster parent, genetic information, or sexual orientation, 


Standard NCSC Course Policies
Important information regarding College Procedures and Policies can be found on the syllabus supplement located at this link

 

 





Add to Portfolio (opens a new window)