CSC206 - Ethical Hacking and Network Defense

Outline info
Last revision date 2018-09-11 12:48:44.831
Last review date 2018-09-11 12:48:44.833

Subject Title
Ethical Hacking and Network Defense

Subject Description
This course prepares students to assess and then correct vulnerabilities present within information systems. Students are introduced to tools and penetration testing methodologies used by ethical hackers. What and who ethical hackers are and how they protect corporate and government data from cyber-attacks is discussed. Methods and tools used in attacks and their countermeasures as well as available security resources and attack "types" systems are also investigated.

Credit Status
One credit toward the Cyber Security Ontario College Graduate Certificate Program.

Learning Outcomes
Upon successful completion of this subject the student will be able to:

  1. Identify the role of Ethical Hacking in today’s network security environment.
  2. Identify the TCP/IP protocol stack.
  3. Describe different types and methods of malicious software, viruses, malware attacks, network attacks, physical security attacks and vulnerabilities.
  4. Identify tools for footprinting, DNS zone transfers and current types of social engineering.
  5. Select port scanning tools and produce port scanning reports.
  6. Describe and demonstrate the enumeration of current operating systems.
  7. Use basic programming concepts. 
  8. Describe vulnerabilities and techniques to harden current operating systems.
  9. Identify embedded systems, where they are used and vulnerabilities associated with them.
  10. Describe web applications, their vulnerabilities and the tools used to attack them.
  11. Identify type and uses of wireless technology and wireless standards.
  12. Describe terms related to cryptography and cryptanalysis.
  13. Identify and describe network protection systems.

Essential Employability Skills
Communicate clearly, concisely and correctly in the written, spoken and visual form that fulfils the purpose and meets the needs of the audience.

Respond to written, spoken, or visual messages in a manner that ensures effective communication.

Apply a systematic approach to solve problems.

Use a variety of thinking skills to anticipate and solve problems.

Locate, select, organize, and document information using appropriate technology and information systems.

Analyze, evaluate, and apply relevant information from a variety of sources.

Manage the use of time and other resources to complete projects.

Take responsibility for one's own actions, decisions, and consequences.

Cheating and Plagiarism
Each student should be aware of the College's policy regarding Cheating and Plagiarism. Seneca's Academic Policy will be strictly enforced.

To support academic honesty at Seneca College, all work submitted by students may be reviewed for authenticity and originality, utilizing software tools and third party services. Please visit the Academic Honesty site on for further information regarding cheating and plagiarism policies and procedures.

All students and employees have the right to study and work in an environment that is free from discrimination and/or harassment. Language or activities that defeat this objective violate the College Policy on Discrimination/Harassment and shall not be tolerated. Information and assistance are available from the Student Conduct Office at

Accommodation for Students with Disabilities
The College will provide reasonable accommodation to students with disabilities in order to promote academic success. If you require accommodation, contact the Counselling and Disabilities Services Office at ext. 22900 to initiate the process for documenting, assessing and implementing your individual accommodation needs.


Topic Outline

  • Role of Ethical Hacking in today’s network security environment
  • TCP/IP protocol stack
  • Types and methods of malicious software, viruses, malware attacks, network attacks, physical security attacks and vulnerabilities
  • Tools for footprinting, DNS zone transfers and current types of social engineering
  • Port scanning tools and reports
  • Enumeration of current operating systems
  • Basic programming concepts
  • Vulnerabilities and techniques to harden current operating systems
  • Embedded systems
  • Web application vulnerabilities
  • Types of wireless technology and standards
  • Cryptography and cryptanalysis
  • Network protection systems

Mode of Instruction
This course is delivered online. This course may involve the use of digital materials and/or a text, group discussions, interaction with your instructor and online activities.

Prescribed Texts

  Textbook 1
Title Gray Hat Hacking
Author Regalado
Publisher McGraw Hill
Edition 4th
ISBN 978-0-07-183238-0

Promotion Policy

Grading Policy
A+ 90%  to  100%
A 80%  to  89%
B+ 75%  to  79%
B 70%  to  74%
C+ 65%  to  69%
C 60%  to  64%
D+ 55%  to  59%
D 50%  to  54%
F 0%    to  49% (Not a Pass)
EXC Excellent
SAT Satisfactory
UNSAT Unsatisfactory

For further information, see a copy of the Academic Policy, available online ( or at Seneca's Registrar's Offices.

Modes of Evaluation

Labs 35%
Quizzes (2 x 20%) 40%
Final Exam* 25%
TOTAL 100%

Please retain this course outline document for future educational and/or employment use.

Approved by: Sheri Ladoucier