CSEC2220 Offensive Security

Course Description

Research a network, examine the traffic and identify its vulnerabilities. Computer security relies on the research and examinations provided by ethical penetration testers. This course provides a foundation for strong security research and the execution of a controlled and well documented system examination to identify weaknesses in an enterprises physical and digital systems. Student Learning Outcomes:

  • Enumerate target networks and systems
  • Analyze computer systems to identify potential vulnerabilities
  • Identify and exploit cross-site scripting, Server Query Language (SQL) injection and file inclusion vulnerabilities
  • Demonstrate creative problem solving and lateral thinking.
  • Develop and deploy a buffer overflow in Linux and Windows operating systems
  • Explain the ethical and legal challenges of a penetration test
  • Apply the appropriate tools for specific reconnaissance or attack
  • Utilize appropriate exploits depending on the presented vulnerability
  • Produce a detailed test report

Prerequisite

Please see eServices for section availability and current pre-req/test score requirements for this course.

3 credits: 2 lectures / presentations, 1 lab, 0 other