School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Ethical Hacking and Defence
  • Unit Code

    CSI3208
  • Year

    2016
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit is an introduction to ethical hacking with a particular focus on internet enabled services and technologies. Students will develop an understanding of modern techniques that can be employed to evaluate the security of implemented network configurations. Based on this understanding students will develop the ability to defend against network based threats. Ethical hacking is an emerging field which favors the practical application of skills to penetrate secure systems in order to demonstrate vulnerability so that steps can be taken to mitigate risk.

Prerequisite Rule

Students must pass 1 unit from CSI1101

Learning Outcomes

On completion of this unit students should be able to:

  1. Describe the role of automation in network audit and attack scenarios.
  2. Describe the role of physical security as it relates to network security.
  3. Discuss the use of deception in the ethical hacking process.
  4. Evaluate different types of network attacks and defensive measures to mitigate the same.
  5. Explain the phases in the ethical hacking process.
  6. Explain the role of ethics and the law as they relate to ethical hacking.

Unit Content

  1. Ethics and the law.
  2. Exploitation and attack.
  3. Network defense concepts.
  4. Physical security
  5. Reconnaissance and footprinting networks.
  6. Reporting.
  7. Social engineering.

Additional Learning Experience Information

Lectures, workshops, case studies, and practical exercises.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Laboratory WorkPractical Exercises conducted using the supplied materials20%
Case StudyDevelop procedure for a provided ethical hacking scenario40%
ExaminationEnd of semester examination40%
ONLINE
TypeDescriptionValue
Laboratory WorkPractical Exercises conducted using the supplied materials20%
Case StudyDevelop procedure for a provided ethical hacking scenario40%
ExaminationEnd of semester examination40%

Text References

  • ^ Mitnick, K. (2002). The art of deception: Controlling the human element of security (1st ed.). Indianapolis, Ind: Wiley
  • ^ Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey, G., & Williams, T. (2011). Gray Hat Hacking (3rd ed.). New York, NY: McGraw-Hill Osborne Media.
  • Shah, S. (2007). Hacking web services. Boston MA: Thompson Publishing/Course Technology.
  • Chirillo, J. (2001). Hack attacks revealed: A complete reference with custom security hacking toolkit. New York: John Wiley & Sons.
  • Simpson, M. T. (2006). Hands-on ethical hacking and network defense. Boston MA: Thompson Publishing/Course Technology.
  • Weaver, R. (2006). Guide to network defense and countermeasures (2nd ed.). Boston MA: Thompson Publishing/Course Technology.
  • Stallings, W. (2006). Cryptography and network security: Principles and practices (4th ed.). New Jersey: Pearson Education Inc.

Website References

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI3208|1|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Ethical Hacking and Defence
  • Unit Code

    CSI3208
  • Year

    2016
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit is an introduction to ethical hacking with a particular focus on internet enabled services and technologies. Students will develop an understanding of modern techniques that can be employed to evaluate the security of implemented network configurations. Based on this understanding students will develop the ability to defend against network based threats. Ethical hacking is an emerging field which favors the practical application of skills to penetrate secure systems in order to demonstrate vulnerability so that steps can be taken to mitigate risk.

Prerequisite Rule

Students must pass 1 unit from CSI1101

Learning Outcomes

On completion of this unit students should be able to:

  1. Describe the role of automation in network audit and attack scenarios.
  2. Describe the role of physical security as it relates to network security.
  3. Discuss the use of deception in the ethical hacking process.
  4. Evaluate different types of network attacks and defensive measures to mitigate the same.
  5. Explain the phases in the ethical hacking process.
  6. Explain the role of ethics and the law as they relate to ethical hacking.

Unit Content

  1. Ethics and the law.
  2. Exploitation and attack.
  3. Network defense concepts.
  4. Physical security
  5. Reconnaissance and footprinting networks.
  6. Reporting.
  7. Social engineering.

Additional Learning Experience Information

Lectures, workshops, case studies, and practical exercises.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Laboratory WorkPractical Exercises conducted using the supplied materials20%
Case StudyDevelop procedure for a provided ethical hacking scenario40%
ExaminationEnd of semester examination40%
ONLINE
TypeDescriptionValue
Laboratory WorkPractical Exercises conducted using the supplied materials20%
Case StudyDevelop procedure for a provided ethical hacking scenario40%
ExaminationEnd of semester examination40%

Text References

  • ^ Mitnick, K. (2002). The art of deception: Controlling the human element of security (1st ed.). Indianapolis, Ind: Wiley
  • ^ Harper, A., Harris, S., Ness, J., Eagle, C., Lenkey, G., & Williams, T. (2011). Gray Hat Hacking (3rd ed.). New York, NY: McGraw-Hill Osborne Media.
  • Shah, S. (2007). Hacking web services. Boston MA: Thompson Publishing/Course Technology.
  • Chirillo, J. (2001). Hack attacks revealed: A complete reference with custom security hacking toolkit. New York: John Wiley & Sons.
  • Simpson, M. T. (2006). Hands-on ethical hacking and network defense. Boston MA: Thompson Publishing/Course Technology.
  • Weaver, R. (2006). Guide to network defense and countermeasures (2nd ed.). Boston MA: Thompson Publishing/Course Technology.
  • Stallings, W. (2006). Cryptography and network security: Principles and practices (4th ed.). New Jersey: Pearson Education Inc.

Website References

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

CSI3208|1|2