Curriculum | 12 Credit Hours
In this hands-on program, you’ll begin with a foundational course and then progress through 3 advanced courses to learn the real-world techniques of pen testers and red teamers. This is the curriculum order for this program.
Required Core Courses | 6 credit hours
ISE 5201: Hacker Tools, Techniques, Exploits, & Incident Handling | SEC504 + GCIH
SANS Course: SEC504: Hacker Tools, Techniques, and Incident Handling
Certification: GIAC Certified Incident Handler Certification (GCIH)
3 Credit Hours
By adopting the viewpoint of a hacker, ISE 5201 provides an in-depth focus into the critical activity of incident handling. Students are taught how to manage intrusions by first looking at the techniques used by attackers to exploit a system. Students learn responses to those techniques, which can be adopted within the framework of the incident handling process to handle attacks in an organized way. The faculty instruction, lab exercises, and exam are coordinated to develop and test a student's ability to utilize the core capabilities required for incident handling.
ISE 6320: Enterprise Penetration Testing | SEC560 + GPEN
SANS Course: SEC560: Enterprise Penetration Testing
Certification: GIAC Penetration Tester Certification (GPEN)
3 Credit Hours
ISE 6320 prepares students to conduct successful penetration testing and ethical hacking projects. The course starts with proper planning, scoping and recon, and then dives deep into scanning, target exploitation, password attacks, and wireless and web apps with detailed hands-on exercises and practical tips for doing the job safely and effectively. Students will participate in an intensive, hands-on Capture the Flag exercise, conducting a penetration test against a sample target organization.
Specialization Elective Courses | 3 credit hours
Students select one of the following courses.
ISE 6315: Web App Penetration Testing and Ethical Hacking | SEC542 + GWAPT
SANS Course: SEC542: Web App Penetration Testing and Ethical Hacking
Certification: GIAC Web Application Penetration Tester (GWAPT)
3 Credit Hours
ISE 6315 is a highly technical information security course in offensive strategies where students learn the art of exploiting Web applications so they can find flaws in enterprise Web apps before they are otherwise discovered and exploited. Through detailed, hands-on exercises students learn the four-step process for Web application penetration testing. Students will inject SQL into back-end databases, learning how attackers exfiltrate sensitive data. They then utilize cross-site scripting attacks to dominate a target infrastructure in a unique hands-on laboratory environment. Finally students explore various other Web app vulnerabilities in-depth with tried-and-true techniques for finding them using a structured testing regimen.
ISE 6325: Mobile Device Security & Ethical Hacking | SEC575 + GMOB
SANS Course: SEC575: iOS and Android Application Security Analysis and Penetration Testing
Certification: GIAC Mobile Device Security Analyst (GMOB)
3 Credit Hours
ISE 6325 helps students resolve their organization's struggles with mobile device security by equipping then with the skills needed to design, deploy, operate, and assess a well-managed secure mobile environment. From practical policy development to network architecture design and deployment, and mobile code analysis to penetration testing and ethical hacking, this course teaches students to build the critical skills necessary to support the secure deployment and use of mobile phones and tablets in their organization.
ISE 6630: Cloud Penetration Testing | SEC588 + GCPN
SANS Course: SEC588: Cloud Penetration Testing
Certification: GIAC Cloud Penetration Tester (GCPN)
3 Credit Hours
ISE 6630 dives into the latest in penetration testing techniques focused on the cloud, how to assess cloud environments, as well as other new topics that appear in the cloud like microservices, in-memory data stores, files in the cloud, serverless functions, Kubernetes meshes, and containers. The course also specifically covers Azure and AWS penetration testing, which is particularly important given that Amazon Web Services and Microsoft account for more than half of the market. The goal is not to demonstrate these technologies, but rather to teach you how to assess and report on the true risk that the organization could face if these services are left insecure.
Students will be able to:
- Conduct cloud-based penetration tests
- Assess cloud environments and bring value back to the business by locating vulnerabilities
- Understand how cloud environments are constructed and how to scale factors into the gathering of evidence
- Assess security risks in Amazon and Microsoft Azure environments
Additional Elective | 3 credit hours
Students select one of the following courses.
ISE 6270: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals | SEC595 + GMLE
SANS Course: SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals
Certification: GIAC Machine Learning Engineer (GMLE)
3 Credit Hours
This course is squarely centered on solving information security problems. This course covers the necessary mathematics theory and fundamentals students absolutely must know to allow them to understand and apply the machine learning tools and techniques effectively. The course progressively introduces and applies various statistic, probabilistic, or mathematic tools (in their applied form), allowing you to leave with the ability to use those tools. The hands-on projects provide a broad base from which you can build your own machine learning solutions. This course teaches how AI tools like ChatGPT really work so that you can intelligently discuss their potential use by organizations and how to build effective solutions to solve real cybersecurity problems using machine learning and AI.
ISE 6315: Web App Penetration Testing and Ethical Hacking | SEC542 + GWAPT
SANS Course: SEC542: Web App Penetration Testing and Ethical Hacking
Certification: GIAC Web Application Penetration Tester (GWAPT)
3 Credit Hours
ISE 6315 is a highly technical information security course in offensive strategies where students learn the art of exploiting Web applications so they can find flaws in enterprise Web apps before they are otherwise discovered and exploited. Through detailed, hands-on exercises students learn the four-step process for Web application penetration testing. Students will inject SQL into back-end databases, learning how attackers exfiltrate sensitive data. They then utilize cross-site scripting attacks to dominate a target infrastructure in a unique hands-on laboratory environment. Finally students explore various other Web app vulnerabilities in-depth with tried-and-true techniques for finding them using a structured testing regimen.
ISE 6325: Mobile Device Security & Ethical Hacking | SEC575 + GMOB
SANS Course: SEC575: iOS and Android Application Security Analysis and Penetration Testing
Certification: GIAC Mobile Device Security Analyst (GMOB)
3 Credit Hours
ISE 6325 helps students resolve their organization's struggles with mobile device security by equipping then with the skills needed to design, deploy, operate, and assess a well-managed secure mobile environment. From practical policy development to network architecture design and deployment, and mobile code analysis to penetration testing and ethical hacking, this course teaches students to build the critical skills necessary to support the secure deployment and use of mobile phones and tablets in their organization.
ISE 6330: Wireless Penetration Testing & Ethical Hacking | SEC617 + GAWN
SANS Course: SEC617: Wireless Penetration Testing and Ethical Hacking
Certification: GIAC Assessing and Auditing Wireless Networks (GAWN)
3 Credit Hours
ISE 6330 takes an in-depth look at the security challenges of many different wireless technologies, exposing students to wireless security threats through the eyes of an attacker. Using readily available and custom-developed tools, students will navigate through the techniques attackers use to exploit WiFi networks, Bluetooth devices, and a variety of other wireless technologies. Using assessment and analysis techniques, this course will show students how to identify the threats that expose wireless technology and build on this knowledge to implement defensive techniques that can be used to protect wireless systems.
ISE 6350: Automating Information Security with Python | SEC573 + GPYC
SANS Course: SEC573: Automating Information Security with Python
Certification: GIAC Python Coder (GPYC)
3 Credit Hours
The ISE 6350 course teaches student in the pen testing specialization, and other students who want to use the Python programming language, how to enhance their overall effectiveness during information security engagements. Students will learn how to apply core programming concepts and techniques learned in other courses through the Python programming language. The course teaches skills and techniques that can enhance an information security professional in penetration tests, security operations, and special projects. Students will create simple Python-based tools to interact with network traffic, create custom executables, test and interact with databases and websites, and parse logs or sets of data.
ISE 6360: Advanced Penetration Testing, Exploit Writing, & Ethical Hacking | SEC660 + GXPN
SANS Course: SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Certification: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
3 Credit Hours
ISE 6360 builds upon ISE 6320 - Enterprise Penetration Testing. This advanced course introduces students to the most prominent and powerful attack vectors, allowing students to perform these attacks in a variety of hands-on scenarios. This course is an elective course in the Penetration Testing & Ethical Hacking certificate program, and an elective choice for the master's program in Information Security Engineering.
ISE 6370: Red Team Operations and Adversary Emulation | SEC565 + GRTP
SANS Course: SEC565: Red Team Operations and Adversary Emulation
Certification: GIAC Red Team Professional (GRTP)
3 Credit Hours
ISE 6370 develops Red Team operators capable of planning and executing consistent and repeatable engagements that are focused on training and on measuring the effectiveness of the people, processes, and technology used to defend environments. You will learn how to plan and execute end-to-end Red Teaming engagements that leverage adversary emulation, including the skills to organize a Red Team, consume threat intelligence to map against adversary tactics, techniques, and procedures (TTPs), emulate those TTPs, report and analyze the results of the Red Team engagement, and ultimately improve the overall security posture of the organization. As part of the course, you will perform an adversary emulation against a target organization modeled on an enterprise environment, including Active Directory, intelligence-rich emails, file servers, and endpoints running in Windows and Linux. Through this course, you will better understand and be able to show the value that Red Teaming and adversary emulations bring to an organization.
ISE 6630: Cloud Penetration Testing | SEC588 + GCPN
SANS Course: SEC588: Cloud Penetration Testing
Certification: GIAC Cloud Penetration Tester (GCPN)
3 Credit Hours
ISE 6630 dives into the latest in penetration testing techniques focused on the cloud, how to assess cloud environments, as well as other new topics that appear in the cloud like microservices, in-memory data stores, files in the cloud, serverless functions, Kubernetes meshes, and containers. The course also specifically covers Azure and AWS penetration testing, which is particularly important given that Amazon Web Services and Microsoft account for more than half of the market. The goal is not to demonstrate these technologies, but rather to teach you how to assess and report on the true risk that the organization could face if these services are left insecure.
Students will be able to:
- Conduct cloud-based penetration tests
- Assess cloud environments and bring value back to the business by locating vulnerabilities
- Understand how cloud environments are constructed and how to scale factors into the gathering of evidence
- Assess security risks in Amazon and Microsoft Azure environments