\setcounter{numTAs}{0} \setcounter{totalSections}{2} \def\secNum{{"001","DL1",""}} \def\tenSchFileName{{"","",""}} \def\classTime{{"T from 06:10 pm to 08:50 pm Location: TBA","T from 06:10 pm to 08:50 pm Location: TBA",""}} \def\classRm{{"","",""}} \def\classLive{{"","",""}} \def\classInstructor{{"Hasshi L. Sudler","Hasshi L. Sudler",""}} \def\classInstrContact{{"","",""}} \def\classInstrOffHrs{{"","",""}} \def\classInstrLive{{"","",""}} \def\TA{{{""},{""},{""}}} \def\TAEmail{{{""},{""},{""}}} \def\TAOffHrs{{{""},{""},{""}}} \def\TARoom{{{""},{""},{""}}} \newcommand\semester{Fall 2021} \newcommand\rsemester{202220} \newcommand\courseNum{ECE 8486} \newcommand\courseName{Ethical Hacking} \newcommand\courseCoordinator{Hasshi L. Sudler} \newcommand\credits{3} \newcommand\contactHrs{3} \newcommand\lecture{1} \newcommand\lab{0} \newcommand\undergradCourse{0} \newcommand\isFreshmanCourse{0} \newcommand\isCustomElecPolicy{0} \newcommand\isClassLive{0} \newcommand\isLabLive{0} \newcommand\meetingMiscExists{0} \newcommand\isClassInstrLive{0} \newcommand\isLabInstrLive{0} \newcommand\instrMiscExists{0} \newcommand\hasTARoom{0} \newcommand\meetingDesc{Example: (Two 75-minute lectures)} \newcommand\meetingMisc{Special notes on meeting info go here, if specified} \newcommand\instructorMisc{Special notes on instructor(s), TA(s) go here, if specified} \newcommand\textBookExists{1} \newcommand\textBookReqd{0} \newcommand\textBookMiscExists{0} \newcommand\referencesExist{0} \newcommand\txtBkAuthExists{0} \newcommand\txtBkPublExists{0} \newcommand\txtBkYrExists{0} \newcommand\txtBkISBNExists{0} \newcommand\textBookTitle{} \newcommand\textBookAuth{} \newcommand\textBookPub{} \newcommand\textBookYr{} \newcommand\textBookISBN{} \newcommand\supplMaterials{The course will require you to either download or access web tools for exercises. Readings will be provided and should be read prior to class discussions.} \newcommand\refPapers{References go here, if specified} \newcommand\textBookMisc{Special notes on textbook(s) go here, if specified} \newcommand\catalogDesc{Quantifying security in an unambiguous way using the Trusted System Evaluation Criteria. "Hacking" a system, developing and implementing countermeasures and threat removal, techniques for Access control, confidentiality, etc. Secure the network, web, enterprise and database, the Cloud and the Semantic Web.} \newcommand\preReqs{None} \newcommand\coReqs{None} \newcommand\coreRequirement{} \newcommand\courseExpectation{To enhance professionals with the ability to improve risk assessments using ethical hacking, analyze personas of malicious hackers, utilize ethical hacking techniques to test perimeter defense, accurately document ethical hacking activities and findings, and design and manage ethical hacking organizations. } \newcommand\ABETOutOne{0} \newcommand\ABETOutTwo{0} \newcommand\ABETOutThree{0} \newcommand\ABETOutFour{0} \newcommand\ABETOutFive{0} \newcommand\ABETOutSix{0} \newcommand\ABETOutSeven{0} \newcommand\covTopics{\item Hacking methods \item Getting information on targets \item Password Attacks \item XSS Attacks \item Cookie Attacks \item SQL Injection \item Hacking DNS \item Hacking Wireless Networks \item Blockchain Attacks \item Staging Denial of Service Attacks \item Pen Testing \item Deploying Malware \item Spyware \item Ransomware Attacks \item Social Engineering \item Hacking Processes and Routine \item Creating Ethical Hacking teams and frameworks} \newcommand\isScheduleExternal{0} \newcommand\isScheduleCommon{1} \newcommand\scheduleRows{17} \newcommand\scheduleCols{3} \newcommand\scheduleHeight{1} \newcommand\schedule{\begin{table}[h!] \centering \caption*{Tentative Schedule for \textbf{All Sections}} \vspace{0.05in} {\renewcommand{\arraystretch}{1.5} \small \begin{tabularx}{\linewidth}{c|l|X} \toprule \large \textbf{Week or Date} & \large \textbf{Topic} & \large \textbf{Assignments}\\ \midrule \midrule Aug 24 & Introduction, Overview and Frameworks, Types of Ethical Hackers, Impacts of hacking & Essay\\ Aug 31 & Hacking methods, Getting information on targets, Cryptography Overview and Hash Algorithms & \\ Sept 7 & Password Attacks & P-Set 1\\ Sept 14 & Hacking Web Application – XSS Attacks, Cookie Attacks & \\ Sept 21 & SQL Injection, Hacking DNS & P-Set 2\\ Sept 28 & Hacking Wireless Networks, Blockchain Attacks, Midterm preparation & \\ Oct 5 & Midterm exam & MIDTERM\\ Oct 12 & Fall Break – No Class & NO CLASS\\ Oct 19 & Staging Denial of Service Attacks & \\ Oct 26 & Pen Testing – Guest speaker & \\ Nov 2 & Deploying Malware, Spyware & P-Set 3\\ Nov 9 & Ransomware Attacks & \\ Nov 16 & Social Engineering & \\ Nov 23 & Hacking Processes and Routine & Paper Draft\\ Nov 30 & Creating Ethical Hacking teams and frameworks & \\ Dec 7 & Semester Design Presentation – Submit final paper & Semester Presentation\\ \bottomrule \end{tabularx} } \end{table}} \newcommand\gradingPolicy{Grading policy here \\ \\ Letter grade scale: A(94--100), A--(90--93), B+(87--89), B(83--86), B--(78--82), C+(74--77),\\ C(70--73), F(<70)} \newcommand\HWandLabPolicy{Homework and/or reading policies All homework should be completed and uploaded to Blackboard by the due date. Unexcused late submissions are penalized. Assigned readings should be complete before attending class. All students should be prepared to discuss readings in details.} \newcommand\AttendancePolicy{\textcolor{red}{Attendance is mandatory for the Midterm exam and for the Semester Design Presentation on the final day of the course. Both Midterm and Semester Presentations will be conducted fully online. All students should sign on 15 minutes before start of class to perform audio and video/screen sharing tests. }} \newcommand\ElectronicsPolicy{\textcolor{red}{Since you opted for a customize electronics policy, you should edit this part. Your policy should address your general stance on recording of class sessions and the circumstances under which recording will be allowed or prohibited. If you generally prohibit recording, yet allow recording of certain classes for some reason, then ypu should notify all students that those classes will be recorded. If recording is permitted as an ADA accommodation for a student, you obviously should not identify that student(s).)}}