Sep 08, 2024  
2023-2024 College Catalog and Student Handbook 
    
2023-2024 College Catalog and Student Handbook
Add to Portfolio (opens a new window)

ITEC 1430 - Certified Ethical Hacker (CEH)


Academic Division:

Business, Industry and Technology


Academic Discipline:

Information Technology


Assistant Dean: Vincent Palombo PhD
3 Credit(s)
This ethical hacking and countermeasures course prepares students for EC-Council’s Certified Ethical Hacker (CEH) exam. The course focuses on hacking techniques and technology from an offensive perspective. The student will learn to scan, test, hack and secure systems. Students will learn the five phases of ethical hacking: reconnaissance; gaining access; enumeration; maintaining access; and covering their tracks. Throughout the course students will be immersed in a hacker’s mindset, evaluating not just logical, but physical security-exploring every possible point of entry to find the weakest link in an organization. UG
3 Lab Hour(s)
2 Lecture Hour(s);
Required Prerequisite Course(s): Take ITEC 1640  ITEC 1650  and ITEC 1840  with a Minimum Grade of C- OR take ITEC-1635 and ITEC 1690  with a Minimum Grade of C-.

College Wide Outcomes
College-Wide Learning Outcomes Assessments - - How it is met & When it is met
Communication – Written  
Communication – Speech  
Intercultural Knowledge and Competence  
Critical Thinking  
Information Literacy  
Quantitative Literacy  


Student Learning Outcomes for Course
Outcomes Assessments – How it is met & When it is met

1. Describe security issues affecting networks and network security.

Weeks 1-2 labs, midterm/final exam

2. List the various types of Footprinting and Footprinting tools.

Weeks 3-4 labs, midterm/final exam

3. Compare and contrast network scanning and sniffing techniques and associated countermeasures.

Weeks 5-6 labs, midterm/final exam

4. Explain social engineering, identity theft, and associated social engineering techniques.

Weeks 7-8 labs, midterm/final exam

5. Demonstrate DOS/DDOS, botnets, DDOS attacks and DOS/DDOS countermeasures for a given set of conditions.

Weeks 9-10 labs, final exam

6. Demonstrate wireless hacking methodologies using a variety of tools for a given set of conditions.

Weeks 11-12 labs, final exam

7. Explain Public Key Infrastructure, cryptography attacks, and cryptanalysis tools.

Weeks 13-14 labs, final exam

8. Demonstrate various types of penetration testing for a given set of conditions.

Weeks 15-16 labs, final exam

 



Standard Grading Scale
93-100      A

90 - 92      A-

87- 89       B+

83 - 86      B

80 -82       B-

77- 79       C+

73 - 76      C

70 -72       C-

67- 69       D+

63 - 66      D

60 -62       D-

00- 59       F


Statement on Diversity
North Central State College believes that every student is a valued and equal member of the community.*  Every student brings different experiences to the College, and all are important in enriching academic life and developing greater understanding and appreciation of one another. Therefore, NC State College creates an inclusive culture in which students feel comfortable sharing their experiences. Discrimination and prejudice have no place on the campus, and the College takes any complaint in this regard seriously. Students encountering aspects of the instruction that result in barriers to their sense of being included and respected should contact the instructor, assistant dean, or dean without fear of reprisal. 

*Inclusive of race, color, religion, gender, gender identity or expression, national origin (ancestry), military status (past, present or future), disability, age (40 years or older), status as a parent during pregnancy and immediately after the birth of a child, status as a parent of a young child, status as a foster parent, genetic information, or sexual orientation, 


Standard NCSC Course Policies
Important information regarding College Procedures and Policies can be found on the syllabus supplement located at this link

 

 





Add to Portfolio (opens a new window)