MSIA675 - Offensive Cyber Security: Syllabus

Instructor Information

Refer to Discussion Forum, Facilitator Introduction and Expectations

Course Title

MSIA675 - Offensive Cyber Security

Course Description

Exposes students to the different hands-on tactics used by offensive cyber security professionals. Topics include reconnaissance, high-jacking, cracking, vulnerability exploitation, and malware deployment.

Prerequisite Courses

This course has a prerequisiste of MSIA605 Advancing to Cyber Security. You need successfully completed the pre-requisite course before joining this class. The only exception is given to those who are experienced IT professionals and have knowledge and skills of OS, Networking, VM, VPN, and basic Unix command line command. Take your own risk to the class or contact your academic adviser to verify your qualification, please.

Course Outcomes

Upon completion of this course, learners should be able to:

Course Materials

Although this is an introductory course, it is a Masters level course, and up to 20 hours of course work per week is expected to receive a successful passing grade.

Required Texts

Basta, A., Basta, N., & Brown, M. (2014). Computer security and penetration testing.

Technology Tools

technical specifications

Optional Materials

All written assignments must be written using the American Psychological Association (APA) style and format, which includes a title page, executive summary, and referencepage.

  1. Regis Dayton Memorial Library
  2. School of Computer and Information Sciences – Resources.
  3. Purdue Online Writing Lab General Writing Resources

Pre-Assignment

Online Format: Sign on to WorldClass (D2L) and become familiar with the course navigation. Complete the readings listed in the Course Assignments and Activities table below.

Classroom-based Format: Complete the readings listed in the Course Assignments and Activities table below. Instructor will make assignments.

Pre-Assignment Due Dates

Classroom-based Format: This assignment is due the first night of class.

Online Format: The instructor will specify the due dates for all assignments.

Course Assignments and Activities

Assignments for Online Course
Week Readings Graded Assignments or Assessments (Percentage)
1: Ethics, Reconnaissance and Scanning Chapters 1-3: Ethics of Hacking and Cracking; Resonances; Scanning Tools

Activity 1: Introductions

Activity 2: Discussion–Reconnaissance

Activity 3: Lab – Q & A Discussion

Activity 4: Begin Paper - Ethics of Hacking and Cracking (Due Week 2)

Activity 5: Knowledge Checks

Activity 6: Lab – Scanning Tools

2: Cracking, Spoofing and Hijacking Chapters 6-8: Encryption and Password Cracking; Spoofing, Session Hijacking

Activity 1: Discussion – Spoofing and Hijacking

Activity 2: Lab – Q & A Discussion

Activity 3: Due Paper - Ethics of Hacking and Cracking (Due Week 2)

Activity 4: Knowledge Checks Activity 5: Lab – Password Cracking

3: TCP Vulnerabilities and Network Devices Chapters 5 & 9: TCP/IP Vulnerabilities; Hacking Network Devices

Activity 1: Discussion – TCP/IP Vulnerabilities

Activity 2: Lab – Q & A Discussion

Activity 3: Knowledge Checks

Activity 4: Lab – Hacking Network Devices

4: Trojan Horses and Denial-of-Service Attacks Chapters 10-11: Trojan Horses; Denial-of-Service Attacks

Activity 1: Discussion – Trojan horse

Activity 2: Lab – Q & A Discussion

Activity 3: Knowledge Checks

Activity 4: Lab – Denial-of-Service Attack

5: Buffer Overflows and Programming Exploits Chapters 11 & 12: Buffer Overflows & Programming Exploits

Activity 1: Discussion – Buffer Overflows

Activity 2: Lab – Q & A Discussion

Activity 3: Knowledge Checks

Activity 4: Lab – Programming Exploits

6: Mail and Windows Vulnerabilities Chapters 14 & 16: Mail Vulnerabilities & Windows Vulnerabilities

Activity 1: Discussion – Mail Vulnerabilities

Activity 2: Lab – Q & A Discussion

Activity 3: Knowledge Checks

Activity 4: Lab – Windows Vulnerabilities

7: Linux and Web Application Vulnerabilities Chapters 15 & 17: Linux Vulnerabilities & Web Application Vulnerabilities

Activity 1: Discussion – Linux Vulnerabilities

Activity 2: Lab – Q & A Discussion

Activity 3: Knowledge Checks

Activity 4: Lab – Web Application Vulnerabilities

8: Incident Handling Chapter 18 Incident Handling

Activity 1: Capstone – Q & A Discussion

Activity 2: Capstone Project

TOTAL:

Summary of Assignments and Percentage Weight:

Assignments Weighted Percentage
Discussions/Knowledge Checks (8) 15%
Labs (7) 60%
Paper – due Week 2 10%
Capstone Project 15%
TOTAL 100 %

CCIS Policies

Review the CCIS Policies on the Regis University website.

OTHER INFORMATION

NOTE TO LEARNERS: On occasion, the course facilitator may, at his or her discretion, alter the Learning Activities shown in this Syllabus. The alteration of Learning Activities may not, in any way, change the Learner Outcomes or the grading scale for this course as contained in this syllabus. Examples of circumstances that could justify alterations in Learning Activities could include number of learners in the course; compelling current events; special facilitator experience or expertise; or unanticipated disruptions to class session schedule.