Announcements

13/10/2011

No Lecture on the 10th Eid Adha Al Mubarak

13/10/2011

No Lecture Next Week  on the 20th

13/10/2011

Survey paper and presentation Due 26th

………………..

……………..

 

 

 

New York Institute of Technology- Amman Campus

School of Engineering & Computer Sciences

Year: 2011/2012

INCS 745

Fall Semester

 

Course Information

Course Title

Intrusion Detection and Hacker Exploits

Course Number

INCS 745

Prerequisites

INCS 615 : Network Security and Perimeter Protection

CSCI 620 : Operating System Security

Course Website

www.just.edu.jo/~munzer

Instructor/Coordinator

Dr. Monther Aldwairi

Office Location/Phone

M2 L2(00962)-2-720 1000 (ext. 22760)

Office Hours

by appointment

E-mail

munzer@just.edu.jo

Assistants

TBA

Catalog Description

Methods used in computer and network hacking are studied with the intention of learning how better to protect systems from such intrusions. Methods used by hackers include reconnaissance techniques, system scanning, and gaining system access by network and application level attacks, and denial of service attacks. The course will extensively study Internet related protocols, methods of traffic analysis, tools and techniques for implementing traffic filtering and monitoring, and intrusion techniques. Combining various hacker techniques to provide common methods and procedures used in a compromising system are studied. Students will utilize the Center for Network and Information Security laboratory to implement a security related project.

 

Text Book

Title

Hacking the Art of Exploitation

Author(s)

Jon Erickson

Publisher

No Starch Press

Edition / Year

2nd edition / 2008

References

1.         HackNotes(tm) Linux and Unix Security Portable Reference”, by Nitesh Dhanjani, 1st edition 2003.

2.         “Hacking Exposed Malware & Rootkits: Malware & Rootkits Security secrets & Solutions”, by Michael Davis, Sean Bodmer, Aaron LeMasters, 1st edition. McGraw Hill, 2010.

 

 

Assessment Policy

Assessment

Date and Location

Weight

Midterm Exam

TBA

20%

Surveys and Presentation

TBA

20%

Research Project

TBA

30%

Final Exam

TBA

30%

Total

 

100%

 

Course Content

Week

Topics

Readings

13/10

Syllabus and Introduction

Project1

20/10

No Class (out of town)

TBA

27/10

Students Presentations  IDS_presentation-Laith Hamasha; Yahoo vulerability-Haitham Elani

 

3/11

Intrusion Detection Systems (Snort) Google Hacking-Ahmed Alradaideh

Exscind

10/11

No Class (Eid AlAdha)

TBA

17/11

Introduction to Network and Programming

TBA

17/11

Exploitation- Buffer Overflow

TBA

24/11

Hacking Techniques 1 (Foot printing, Port Scanning, Sniffing etc…)

TBA

1/12

Denial of Service Attacks (SYN Flooding, Teardrop, Ping of the death, etc…)

TBA

8/12

Hacking Techniques 2 (Enumeration, Hijacking, etc…)

TBA

15/12

Wireless Hacking

TBA

22/1

SPAM

TBA

29/12

Viruses, Malwares and RootKits

TBA

5/1

Virus Defense and Detection

TBA

12/1

Final Exam!

TBA

 

Essential Notes

Makeup Exams

§  Makeup exam will not be held except with a valid and dean approved excuse.

§  Arrangements to take an exam at a time different than the one scheduled MUST be made prior to the scheduled exam time

NYITb Attendance Policy

§ A student is expected to attend each class session on a regular and punctual basis in order to obtain the educational benefits, which each meeting affords. Students shall be informed by their instructors exactly how often they will be allowed to be late or absent during the semester. Students who exceed these limits may be withdrawn from the course by the instructor. In the event of a student’s absence from a test, the instructor will generally determine whether the student will be allowed to make up the work that was missed. Lack of preparation is not an adequate excuse for missing an examination.

Drop Date

§  21/12/2011 + Check the Records and Registration office for updates.

Incomplete

I grade

§  A grade of incomplete, I, can be given by the instructor after consultation with the Department Chair. It is used when a student, because of some unavoidable circumstance, has been unable to complete all assigned work for the course. The instructor must certify that the student’s work is passing at this point and the student must agree to complete the missing the work. A grade of I will become an F in the following situation:

§  I is given in the spring semester and not made up by the end of the following fall.

§  I is given in the fall semester and not made up by the end of the following summer.

Withdrawal

W grade

§  Students can withdraw up to the 8th week of the semester and receive a grade of W. After the 8th week deadline, a student may withdraw and receive a W only if the student is passing the course. Otherwise, a student withdrawing after the 8th week will receive a grade of WF.

Projects

§  Projects are treated exactly as an exam!

§  Late submission

o   -20%  2 days

o   -40%  4 days

o   -80%  week

o   0 after that

Academic

Dishonesty

§  Academic dishonesty, use of consultants at exam time, copying exams or plagiarizing homework assignments will result in an F grade on the exam or assignment. If it occurs more than once, the course grade will be F.

 

 

Prepared by: Dr. Monther Aldwairi

13/10/2011.

 

Good Luck!