Type of Credit: Partially Required
Credit(s)
Number of Students
本課程介紹系統與網路等受測目標的安全性與弱點以及可能被利用的途徑,透過模擬駭客與惡意使用者的思維、工具、及技術來測試與驗證受測目標的相關弱點及風險層級,並評估如何改善受測目標的安全性漏洞以提高整體資訊安全。
課程中擬採用國網中心CDX雲端資安攻防平臺(Cyber Defense eXercise)帶領學生上機演練,透過虛擬化環境佈署相關攻防演練場景讓學生學習使用相關檢測工具並實際操作滲透測試相關技術,以提高學生資安技術觀念及能力。
This course introduces the security and vulnerabilities of systems, networks, and other targeted object, as well as potential exploitation methods. By simulating the mindset, tools, and techniques of hackers and malicious users, we will test and verify the vulnerabilities and risk levels of targeted objects. Furthermore, we will evaluate how to improve the security vulnerabilities of targeted objects to enhance overall cybersecurity.
In this course, we will utilize the cloud-based security training platform, CDX (Cyber Defense eXercise) of National Center for High-Performance Computing (NCHC), to guide students in hands-on exercises. Through CDX, we will deploy various attack and defense scenarios for students to learn how to use relevant detection tools and practice penetration testing techniques, thereby enhancing students' understanding and skills in cybersecurity.
能力項目說明
學生於本課程將習得以下能力:
1. 了解系統、網路及應用程式的強度、弱點及威脅。
2. 熟悉與掌握相關檢測工具及技術。
3. 具備強化系統與網路弱點之知識。
In this course, students will learn to:
1. Identify the strengths, weaknesses, and threats of systems, networks, and applications.
2. Be familiar with relevant detection tools and techniques.
3. Acquire the knowledge to strengthen the vulnerabilities of systems and networks.
教學週次Course Week | 彈性補充教學週次Flexible Supplemental Instruction Week | 彈性補充教學類別Flexible Supplemental Instruction Type |
---|---|---|
Note: The following is a preliminary course schedule. Course schedule may change and the actual course content will be posted on the Moodle page.
週次 Week |
課程主題 Topic |
課程內容與指定閱讀 Content and Reading Assignment |
教學活動與作業 Teaching Activities and Homework |
學習投入時間 Student workload expectation |
|
課堂講授 In-class Hours |
課程前後 Outside-of-class Hours |
||||
W01 02/17 |
資訊安全滲透測簡介 Introduction to Penetration Testing |
Syllabus & Introduction to Penetration Testing |
V |
3 |
3 |
W02 02/24 |
網路資訊蒐集 Network Information Gathering Techniques |
Network Information Gathering Techniques & Cyber Defense eXercise, CDX |
HW#1 |
3 |
3 |
W03 03/03 |
弱點發現及掃描技術 Vulnerability Discovery and Scanning |
OpenVAS & Nessus |
V |
3 |
3 |
W04 03/10 |
密碼學、密碼設置、密碼分析與通行碼 Cryptography, Password Security, Cryptanalysis, and Passphrases |
John the Ripper |
V |
3 |
3 |
W05 03/17 |
弱點利用平台 Vulnerability Exploitation Platforms |
Kali Linux & Metasploit |
HW#2 |
3 |
3 |
W06 03/24 |
Windows弱點利用 Windows Exploitation |
Mimikatz & Powershell & SMB & AD |
V |
3 |
3 |
W07 04/31 |
Linux弱點利用 Linux Exploitation |
Chroot & Kernel exploit |
V |
3 |
3 |
W08 04/07 |
Web Server及Web弱點利用 Web Server and Web Application Exploitation |
Apache/IIS/Tomcat server and config & SSL/TLS |
V |
3 |
3 |
W09 04/14 |
Midterm CYBERSEC 2025 04/15~04/17 |
Midterm
CYBERSEC 2025 04/15~04/17 |
V |
3 |
4.5 |
W10 04/21 |
內網滲透 Internal Network Penetration |
Sniffer, ARP Spoofing and Poisoning, MITM |
HW#3 |
3 |
3 |
W11 04/28 |
VPN安全測試及通訊掩護 VPN Security Testing and Traffic Obfuscation |
IKEForce & PPTP Hacking & Overlay network |
V |
3 |
3 |
W12 05/05 |
網路設備滲透及WiFi滲透 Network Device and WiFi Penetration |
SSDP & CDP & Aircrack ng |
V |
3 |
3 |
W13 05/12 |
實體滲透 Physical Penetration |
Key logger & BadUSB |
V |
3 |
3 |
W14 05/19 |
社交工程 Social Engineering |
urlcrazy &Setoolkit & Beef |
HW#4 |
3 |
3 |
W15 05/26 |
阻斷服務及壓力測試 Denial of Service and Stress Testing |
DoS/DDoS & DDoSer hping |
V |
3 |
3 |
W16 06/02 |
Term Project Report |
Term Project Report |
V |
3 |
4.5 |
W17 06/09 |
Course-related Online Learning |
|
|
|
|
W18 06/16 |
Self-learning |
|
|
|
|
The grading criteria is tentatively as follows. Please refer to Moodle of this course for the final version.
In-class lab activities and homework: 50%
Midterm: 25%
Term Project: 25%
This course is conditionally open to use Generative AI tools:
本課程有條件開放使用生成式AI工具:
Textbooks and references:
1. Kali Linux Penetration Testing Bible (Gus Khawaja, Wiley, ISBN: 978-1119719083)
2. Adversarial Tradecraft in Cybersecurity: Offense versus defense in real-time computer conflict (Dan Borges, Packt Publishing, ISBN: 978-1801076203)
3. 極黑駭客專用的OS:Kali Linux2無差別全網滲透 (李華峰, 深智數位, ISBN: 978-9860776072)
The Moodle link https://moodle-course02.nccu.edu.tw/course/view.php?id=9555