University of Information Technology

Computer Security & Ethical Hacking

Course Description

With the widespread use of computers and internet as well as the rapid spread of electronic commerce, computer security has become very important. This course introduces the main cryptographic methods for communication and computer system security. The topics include: Ethical Hacking, Ethics and Legality, Gathering Target Information, Gathering Network and Host Information, System Hacking, Trojans, Backdoors, Viruses and Worms, Gathering Data from Networks: Sniffers, Denial of Service and Session Hijacking, Web Hacking and Wireless Network Hacking. The course will also cover international standards that implement the concepts.

  • to describe some factors that affect the security of networks and data
  • communications
  • to introduce some basic types of security service and their components,
  • to penetrate a system or systems to find a weak link and then analyze ways to correct the security flaws with legal permission
  • to know ethical hacking methodology, generalized exploit techniques, basic network concepts, networking vulnerabilities and countermeasures.

Intended Learning Outcomes (ILO)

  • Identify some of the factors driving the need for network security
  • Identify and classify particular examples of attacks
  • Define the terms vulnerability, threat and attack and understand computer systems threats
  • Understand and identify the physical points of vulnerability and the advisory and counter measures in simple networks
  • Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack and explain the characteristics of hybrid systems
  • Employ basic practical security principles to computer systems and infrastructure

Text and References Books

Textbooks

  1. Computer Network Security and Cyber Ethics, Joseph Migga Kizza, Fourth Edition, 2014.ISBN-13: 978-0786493920 , ISBN-10: 9780786493920
  2. Hands-On Ethical Hacking and Network Defense, Michael T. Simpson, Kent Backman, James E. Corley,ISBN-13: 978-1-133-93561-2, ISBN-10: 1-133-93561-3
  3. The Basics of Hacking and Penetration Testing, Patrick Engebretson, Second Edition, 2013.ISBN-13: 978-0124116443, ISBN-10: 9780124116443.

References

  1. Certified Ethical Hacker, Kimberly Graves, 2010.ISBN-13: 978-0470525203, ISBN-10: 0470525207
  2. CEH v10 EC-Council Certified Ethical Hacker Complete Training Guide with Practice Labs ISBN-13: 978-1723798412, ISBN-10: 172379841X
  3. Ethical Hacking and Countermeasures, EC-Council, 1st edition.ISBN-10: 143548360X, ISBN-13: 978-1435483606
  4. Ethical Hacking and Penetration Testing Guide, Rafay Baloch,ISBN-13: 978-1-4822-3162-5

Assessment System

Evaluation Marks Percentage
Assignment/Discussion 10 Marks 10%
Tutorial 10 Marks 10%
Lab 10 Marks 10%
Project 10 Marks 10%
Final Examination 60 Marks 60%