Online Digital Forensics Courses and Labs
Building a Low-cost and State-of-the-art IoT Security Hands-on Laboratory

Funded by National Science Foundation (NSF)
Funded by Cyber Florida

 

Cyber Operation and Penetration Testing

Home                      Lecture Notes                        Assignment


Instructor:        Dr. Cliff Zou ,  407-823-5015,   czou@cs.ucf.edu

Prerequisite:              
                  Knowledge on computer architecture, data structure, and networking;
                  Knowledge of basic usage of Linux machine.

Textbook:   

The Basics of Hacking and Penetration Testing (2nd edition) by Patrick Engebretson. Syngress (August 15, 2013). ISBN-10: 0124116442, ISBN-13: 978-0124116443.

Course Learning Objectives:

(a) Understand basic knowledge and procedure on handling with cyber security attack, data breach, data damage incidents;
(b) Able to conduct basic forensic analysis of Windows and Linux systems;
(c) Able to use popular tools in analyzing compromised systems and conducting static and dynamic malware analysis;
(d) Able to use Wireshark for network traffic capture and analysis, and use Splunk software to process and analyze security logs.

Course Outline:

Introduction and basic operation of Virtual machine (Virtual Box)
    Installing Kali Linux virtual machine for later penetration testing
    Basic usage of Linux operating system
Network traffic monitoring and Wireshark tool
    Network layer and data link layer traffic monitoring
    Wireshark introduction and usage
Footprinting
    Information gathering process
    Gathering detailed target/victim information through various Internet service
Port scanning
Password cracking (online, offline)
Vulnerable machine exploit using Metasploit
� Web penetration testing
� OS Security and System Hardening