Faculty : Computer Science and Information Technology Programs
School : Program of Computer Networks and Cyber Security
Prerequisit Course : CNC312 and CNC321
Credit Hours : 3.00
Offered For : Under Graduate
Course Description :
This course teaches penetration testing techniques that quickly, efficiently and most importantly methodically uncover vulnerabilities in operating systems, applications and networks. Footprinting and Reconnaissance, Scanning Networks, System Hacking, Trojans and Backdoors, Viruses and Worms, Hacking Web Servers and Web Applications, Buffer Overflow and SQL Injections, Crack passwords and wireless network keys with brute-forcing and wordlists, Use the Metasploit Framework to launch exploits and write your own Metasploit modules, Bypass antivirus software and turn access to one machine into total control of the enterprise in the post exploitation phase. Students will learn core skills and techniques that every pentester needs. Ethical Hacking and Penetration Testing Lab provides practical implementation and extermination of the course material given in the lectures of CNC 421, and lab projects. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, they will run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite.
CNC414 - Graduation Project (1)
Faculty : Computer Science and Information Technology Programs
School : Program of Computer Networks and Cyber Security
Prerequisit Course : No Pre-Requisit Courses
Credit Hours : 2.00
Offered For : Under Graduate
Course Description :
Theoretical investigation and problem identification of a special project in Cyber Security and Information Systems under the supervision of an academic member. The project is an application of Cyber Security and Information Systems skills and techniques studied. The student should use. Detailed report as well as an oral examination are required
CNC413 - Digital Forensics
Faculty : Computer Science and Information Technology Programs
School : Program of Computer Networks and Cyber Security
Prerequisit Course : CNC321
Credit Hours : 3.00
Offered For : Under Graduate
Course Description :
This course provides overview of digital forensic. Topics covered includes, introduction to digital forensic, digital forensic process, digital forensic tools, investigative methodology, current techniques and tools for forensic examinations & Analysis, Digital investigations,
Page 76
Electronic Discovery, Intrusion Investigation, Antiforensics, Windows Forensic Analysis, Embedded Systems Analysis &Network Evidence and Investigations. Digital Forensics Lab provides practical implementation and extermination of the course material given in the lectures of CNC 413, and lab projects.
CNC415 - Network Design and Management
Faculty : Computer Science and Information Technology Programs
School : Program of Computer Networks and Cyber Security
Prerequisit Course : CNC323
Credit Hours : 3.00
Offered For : Under Graduate
Course Description :
The primary objective of this course is to give students an understanding of how to design, manage and secure computer networks and systems. It further examines how network managers and security engineers can strategically use different techniques to capture, collect and analyze network and system data to create a competitive advantage. Network Design and Management Lab provides practical implementation and extermination of the course material given in the lectures of CNC 415, and lab projects.
CNC329 - Information Security Law, Policy, and Ethics
Faculty : Computer Science and Information Technology Programs
School : Program of Computer Networks and Cyber Security
Prerequisit Course : CNC312
Credit Hours : 3.00
Offered For : Under Graduate
Course Description :
This course provides in depth analysis of information security laws in many jurisdictions and needs to understand the overall framework of legal security requirements, so it can evaluate how local law fits in, and what it might do to become generally legally compliant in many jurisdictions and under many laws. This course also provides a concise overview of the traditional ethical frameworks that can guide our analysis of the moral dilemmas and social problems that rise in cyberspace. Legal Response to Security, General duty to provide security, Legal standard for compliance, Developing a compliant security program and security controls
Page 82
to consider, Role of standards, Security breach notification, Content Control in Cyberspace, Intellectual property in cyberspace, Securing the electronic frontier, Securities regulations in Egypt. Anti-Money Laundering and counter-terrorist financing rules. Information Security Law, Policy, and Ethics Lab provides practical implementation and extermination of the course material given in the lectures of CNC 329, and lab projects