![]() |
Course: CIS256CN First Term: 2022 Fall
Final Term: Current
Final Term: 9999
|
Lec + Lab 3.0 Credit(s) 4.0 Period(s) 4.0 Load
Credit(s) Period(s)
Load
Subject Type: OccupationalLoad Formula: T- Lab Load |
MCCCD Official Course Competencies | |||
---|---|---|---|
1. Demonstrate how to build a password cracker using Python. (I)
2. Conduct port scanning attacks to access a system’s firewall strength. (II) 3. Evaluate how Python can be used to script attacks for penetration testing. (II) 4. Implement Python to support digital forensic investigation tasks. (III) 5. Utilize Python libraries and frameworks to automate network tasks. (IV) 6. Conduct network analysis and monitoring using Python libraries. (V) 7. Demonstrate how to use Python libraries to secure networks. (I, VI) | |||
MCCCD Official Course Competencies must be coordinated with the content outline so that each major point in the outline serves one or more competencies. MCCCD faculty retains authority in determining the pedagogical approach, methodology, content sequencing, and assessment metrics for student work. Please see individual course syllabi for additional information, including specific course requirements. | |||
MCCCD Official Course Outline | |||
I. Password cracker
A. Dictionary B. Brute force C. Hybrid II. Penetration testing A. Port scanning using Python-nMap B. Secured Shell (SSH) protocol attacks C. File Transfer Protocol (FTP) protocol attacks D. Server Message Block (SMB) protocol attacks E. Detecting SQL vulnerabilities III. Forensic investigation tasks A. Geolocation through Windows Registry B. Recovering deleted files C. Extracting file metadata IV. Automation of networking tasks A. Restarting services B. Applying updates C. Grabbing log files D. Deploying applications E. Cloud provisioning F. Configuration management G. Other networking tasks V. Network analysis and monitoring A. Retrieving and graphing Simple Network Management Protocol (SNMP) information B. Graphing network topologies C. Parsing IP traffic information and analyzing flow records VI. Securing networks A. Sniffing network packets B. Conducting Syslog searches using regular expressions C. Port-scanning using Python-nMap | |||
MCCCD Governing Board Approval Date: September 28, 2021 |