CSEC 2310 Network Intrusion

This course examines ethical hacking and information systems security auditing. Students will focus on the current security threats, advanced attack vectors, and practical real time demonstration of the latest hacking techniques, methodologies, tools, tricks, and security measures. The course will explore pentesting (Penetration Testing), hacking and securing systems. The lab intensive environment provides student’s in-depth knowledge and practical experience with the current security systems. Foundational concepts include how perimeter defenses work and scanning and attacking networks. Students will learn how intruders escalate privileges and what steps can be taken to secure information technology system. Content topics include: intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows, and virus creation.
Additional Public Access To Materials:
http://pine.edu
Date:
2015-08
Primary Material Type:
Collection
Other Material Types:
Quality Assurance Report -- Subject Matter Expert Report
Institution:
Pine Technical and Community College
Project Name:
RITA
Funding Source:
TAACCCT Round 3
Subjects:
Network Intrusion

Industry / Occupation

Industry Partner:
Information Technology
Industry Sector:
Professional, Scientific, and Technical Services -- Professional, Scientific, and Technical Services -- Computer Systems Design and Related Services (5415)
Occupation:
Computer and Mathematical Occupations -- Network and Computer Systems Administrators (15-1071)

Education / Instructional Information

Credit Type:
  • Credit
Credential Type:
  • Stacked/Latticed Credential Model
  • Associate Degree
Educational Level of Materials:
  • 2nd Year Community College or equivalent
Time Required:
Semester
Language:
English (United States)
Interactivity Type:
Mix of Active and Presentation.
Quality of Subject Matter was assured by:
  • SME Quality Report is posted in Skills Commons
Quality of Online/Hybrid Course Design assured by:
  • None
Course Note:
Cyber Security

Accessibility

Accessibility Features:
  • Text Access - Text to Speech
  • Text Adjust - Compatible
  • Text Adjustment - Adjust Font and Colors
  • Reading Layout - Reflow the Text
  • Reading Layout - Page numbers match printed material
  • Reading Layout - Reflow the Text
  • Reading Order - Digital resource layout
  • Structural Markup - Navigation Text
  • Structural Markup - Lists
  • Structural Markup - eReader application
  • Table Markup
  • Hyperlinks Rendered As Active
  • Contrast Ratio of at Least 4.5:1.
  • Language - Passage Markup
  • Non-Decorative Images Have Alt Text
  • Decorative Images Marked With Null Alt Text
  • Complex Images, Charts, and Graphs Have Text Descriptions
  • Synchronized Text Track
  • Transcript Provided With Audio Content
  • Audio/Video Delivered Via Media Player
  • Non Flickering Content
  • STEM Content (e.g. Mathematics, Chemistry) Markup
  • STEM - Notation markup
  • Interactive - Keyboard
  • Interactive - Markup
  • Interactive - Text prompts

Copyright / Licensing

Primary License:
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.