Skip Navigation
 

Course Details

 

Course Details

Course Code: ISSC442 Course ID: 4863 Credit Hours: 3 Level: Undergraduate

The mobile communication market has grown so rapidly keeping up security in wireless networks has become a challenge. Maintaining secure connectivity on mobile devices as well as retaining flexibility, mobility, and resilience are critical to keeping files, data, and information secure and private. This course explores security issues surrounding mobile cellular communication technologies. Hands-on labs are also included as practical examples of wireless network security. (Prerequisite: ISSC343)

Course Schedule

Registration Dates Course Dates Start Month Session Weeks
03/29/2022 - 09/02/2022 09/05/2022 - 10/30/2022 September Summer 2022 Session D 8 Week session
05/21/2022 - 11/04/2022 11/07/2022 - 01/01/2023 November Fall 2022 Session I 8 Week session

Current Syllabi

  1. Categorize vulnerabilities and exploit types on wireless and mobile networks and identify the challenges of securing information on the Internet
  2. Review exploiting secured networks using WEP, WPA, WPA2, WPS, and popular authentication mechanisms. Examine the processes, best practices, and techniques to manage and prevent cybercrime
  3. Review special techniques and special tools such as Wireshark, Kismet, MDK3, TCPreplay, GHex, Hydra, Reaver, Cowpatty, and similar tools used to exploit encryption keys and vulnerabilities in wireless and mobile
  4. Discover wireless networks using Active and Passive Discovery methods
  5. Describe how Windows systems are compromised, their built-in tools, and how to exploit remote wireless networks
  6. Examine eavesdropping techniques, Bluetooth Classic exploits and susceptibility of Low Energy traffic
  7. Examine vulnerabilities in ZigBee Security
  8. Describe how Z-Wave Smart Homes can be compromised through eavesdropping or injection
NameGrade %
Weekly Assignments 30.00 %
Week 1 Assignment 5.00 %
Week 2 Assignment 5.00 %
Week 3 Assignment 5.00 %
Week 4 Assignment 5.00 %
Week 6 Assignment 5.00 %
Week 7 Assignment 5.00 %
Discussions 40.00 %
Forum 1 Participation 5.00 %
Forum 2 Participation 5.00 %
Forum 3 Participation 5.00 %
Forum 4 Participation 5.00 %
Forum 5 Participation 5.00 %
Forum 6 Participation 5.00 %
Forum 7 Participation 5.00 %
Forum 8 Participation 5.00 %
Final Term Paper 30.00 %
Final Term Paper 20.00 %
Final Term Paper Outline 10.00 %
  1. Categorize vulnerabilities and exploit types on wireless and mobile networks and identify the challenges of securing information on the Internet
  2. Review exploiting secured networks using WEP, WPA, WPA2, WPS, and popular authentication mechanisms. Examine the processes, best practices, and techniques to manage and prevent cybercrime
  3. Review special techniques and special tools such as Wireshark, Kismet, MDK3, TCPreplay, GHex, Hydra, Reaver, Cowpatty, and similar tools used to exploit encryption keys and vulnerabilities in wireless and mobile
  4. Discover wireless networks using Active and Passive Discovery methods
  5. Describe how Windows systems are compromised, their built-in tools, and how to exploit remote wireless networks
  6. Examine eavesdropping techniques, Bluetooth Classic exploits and susceptibility of Low Energy traffic
  7. Examine vulnerabilities in ZigBee Security
  8. Describe how Z-Wave Smart Homes can be compromised through eavesdropping or injection
Book Title:Various resources from the APUS Library & the Open Web are used. Please visit http://apus.libguides.com/er.php to locate the course eReserve.
ISBN:ERESERVE NOTE
 
Book Title:Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems - e-book available in the APUS Online Library
ISBN:9781593278021
Publication Info:No Starch Press Lib
Author:Sanders, Chris
Unit Cost:$32.28
 

Previous Syllabi

Not current for future courses.