CSCI 632 Ethical Hacking

This course goes into the how and why of ethical hacking, and how it is used to strengthen security of systems, including issues in penetration testing, such as physical security and social engineering.

For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

Course Guide

View this course’s outcomes, policies, schedule, and more.*

*The information contained in our Course Guides is provided as a sample. Specific course curriculum and requirements for each course are provided by individual instructors each semester. Students should not use Course Guides to find and complete assignments, class prerequisites, or order books.


The Ethical Hacking course introduces the student to the methods and techniques used by computer hackers and penetration testers from a real-world perspective. The objective of this course is to provide the student with an understanding of offensive security, with an emphasis on practical exposure to hacking via hands-on assignments, in order to prepare him/her to better defend against cyber attacks in live systems.


Textbook readings and lecture presentations

No details available.

Course Requirements Checklist

After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in the Course Overview.

Discussions (3)

Discussions are a collaborative learning experience. Therefore, the student is required to create a thread in response to the provided topic for each discussion. Each thread must be 500 words and demonstrate course-related knowledge. The student must integrate relevant biblical principles and include at least one other reference in the thread. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be 250 words and contain at least one reference. Acceptable references include the textbook and peer-reviewed scholarly sources. Where applicable, references should be cited in current APA format.

Lab Assignments (5)

The student will complete labs associated with the course material. Each lab will have specific instructions for tasks, along with deliverables, to be completed in the virtual lab environment.

Research Paper Assignments (2)

The student will complete 2 written research assignments on penetration testing methodology and small network security according to assignment instructions. Each paper must be 3-5 pages, integrate biblical principles, and include at least 3 references (with in-text citations) in current APA format. Acceptable references include peer-reviewed articles that have been published within the past 5 years.

Quizzes (2)

Students will complete one mid-term exam and one final exam. Each exam will contain 25 multiple-choice questions, be open-book/open-notes, and have a 1-hour time limit.


Top 1% For Online Programs

Have questions about this course or a program?

Speak to one of our admissions specialists.