Revised 8/2023
ITN 261 - Network Attacks, Computer Crime and Hacking (4 CR.)
Course Description
Encompasses in‐depth exploration of various methods for attacking and defending a network. Explores network security concepts from the viewpoint of hackers and their attack methodologies. Includes topics about hackers, attacks, Intrusion Detection Systems (IDS) malicious code, computer crime and industrial espionage.
General Course Purpose
This course introduces the student to the process and tools, including nmap and other port scanning tools, used to perform ethical hacking. A discussion of different network attacks, computer crime, and hacking is provided. The purpose of this course is to inform the student of common techniques used by attackers in order to increase awareness and assist the student learn how to effectively counter these attacks. This course also includes content, as indicated below in parenthesis behind each learning objective, which directly maps to DHS/NSA’s Center of Academic Excellence – 2 Year (CAE2Y) criteria. Learn more about 91勛圖's Cybersecurity Program.
Course Prerequisites/Corequisites
Prerequisite: ITN 260
Course Objectives
Upon successful completion of this course, the student will have a working knowledge of:
- Hacker attack techniques, methodologies, and tools
- Network worms, viruses, and malicious code
- Computer crime
- Industrial espionage
- Information warfare
Major Topics to Be Included
- Network Attacks
- Malicious Code
- Computer Crime
- Industrial Espionage
- Information Warfare
Student Learning Outcomes
- Attacks (PTT)(VLA)
- Explain the professional hacker’s methodology for attacking a network.
- Explain the script kiddie’s methodology for attacking network.
- Explain network security vulnerabilities.
- Explain hackers, hacker techniques, tools and methodologies.
- Describe hacker motivation
- Describe and perform network reconnaissance
- Describe and perform network mapping and scanning
- Describe and perform gaining access to a network.
- Describe and perform maintaining access to a network.
- Describe and perform covering tracks after gaining access to a network.
- Describe the Adversary Model (resources, capabilities, intent, motivation, risk aversion, access).
- Be able to use a network mapping tool to identify open ports on a network
- Malicious Code (CTH)
- Describe the general symptoms of a virus attack
- Differentiate between viruses and worms.
- Identify and describe the various categories of viruses and how they operate.
- Identify and describe the virus attack categories.
- Identify and describe the propagation of worms.
- Learn the terms and definitions associated with viruses, worms and malicious code.
- Describe the use of social engineering in the propagation of worms and viruses.
- Describe the operation of a macro virus.
- Define and describe the two basic approaches to antivirus software.
- Describe how to defend against a worm and virus attack.
- Computer Crime (CCR)
- Describe the steps in planning for a computer incident.
- Identify the difficulty in establishing who has jurisdiction over a computer crime.
- Understand the legal issues with regard to preserving digital evidence.
- Describe the various factors to consider in evaluating the financial loss due to a computer incident.
- Identify and describe the incident response goals and priorities.
- Describe the factors involved in identifying a computer incident.
- Describe and use the various tools associated with identifying an intruder.
- Specify the process for the initial response to an incident.
- Identify the various factors involved in assessing an incident.
- Identify the various types of documentation that should be examined in evaluating an incident.
- Describe how to handle and evaluate a computer incident.
- Recognize the role of law enforcement and rule of particularity in executing a search warrant.
- Describe the role the network security specialist would play in assisting the law enforcement and prosecution effort.
- Describe the difficulties in prosecuting a computer crime incident.
- Industrial Espionage (CCR)(ICS)
- Differentiate between competitive intelligence, economic intelligence, and industrial espionage.
- Differentiate between information, data, knowledge and intelligence.
- Specify the advantages of intelligence in industrial espionage.
- Describe the foreign intelligence organizations interested in economic intelligence and their general methodology.
- Describe Industrial Control Systems (ICS) and security issues associated with ICS and SCADA.
- Describe personnel countermeasure factors.
- Describe physical countermeasure factors.
- Describe technical countermeasure factors.
- Information Warfare (CSE)(PLE)
- Describe the history of warfare and its relationship to information warfare.
- Describe the historical factors that lead to information warfare.
- Explain the concerns of the US. Government with regard to the information infrastructure.
- Identify the spectrum of threats against the information infrastructure.
- Specify the role of offensive information warfare.
- Identify the types and roles of information warfare weapons.
- Specify the role of defensive information warfare.
- Explain the information assurance factors relating to defensive information warfare.
- Explain the military role in information warfare.
- Explain the civilian role in information warfare.
- Explain the law enforcement role in information warfare.
Optional Topics
KU Category | Course Content KU Mapping | CAE2Y KU Name | Description |
---|---|---|---|
Core Non-Technical CDE Knowledge Units | CTH | Cyber Threats | Provide students with basic information about the threats that may be present in the cyber realm. |
PLE | Policy, Legal, Ethics, and Compliance | Provide students with understanding of information assurance in context and the rules and guidelines that control them. | |
Optional Knowledge Units | CCR | Cyber Crime | Provide students with an understanding of Cyber Crimes and other abuses arising in a cyber environment. |
PTT | Penetration Testing | Provide students with methods of discovering ways of exploiting vulnerabilities to gain access to a system. | |
VLA | Vulnerability Analysis | Provide students with a thorough understanding of system vulnerabilities, to include what they are, how they can be found/identified, the different types of vulnerabilities, how to determine the root cause of a vulnerability, and how to mitigate their effect on an operational system. | |
ICS | Industrial Control Systems | Provide students with an understanding of the basics of industrial control systems, where they are likely to be found, and vulnerabilities they are likely to have. | |
CSE | Cybersecurity Ethics | Provide students with an understanding of ethics in a cyber context, to examine typical situations where ethical dilemmas arise and to provide the students with tools for ethical decision making. |