Las Positas College logo

Moh Daoud Computer Studies Web site
Moh Daoud's Home page



Will a robot take your job?

Introduction To Operating Systems CNT 50 or CIS 65
operating systems

Linux/UNIX, CompTIA Linux+, LPI Cert. Course 7401
or CS 41
This course is offered online or in-person

Cloud Computing - Infrastructure CNT 7285
CompTIA A+/Dell/EMC/Amazon
Web Service (AWS) Foundations

Microsoft MCSA MCP Professional Cert..
CNT 57 Identity with Server 2016

mcsa logo mcsa logo

Cisco CCENT/CCNA1 CCNA1 Intro to Networking CNT 8001
This course is offered online or in-person

ccent logoccna logo  

Cisco Routing & Switching CCNA2 Course CNT 8002
This course is offered online or in-person

ccent logo ccna logo
CompTIA Network Security+ Course CNT 69
This course is offered online or in-person
Ethical Hacking and Penetration Testing Course CNT 7501
This course is offered online or in-person

CEH Training Videos on VTC Site ($39)

Digital Forensics, Intro to Computer Forensics Course CNT 68 .
hard disk
Ask the instructor about this program.
Classes at Chabot College
onine or in person

search for classes

Announcements for Students

New Degree 2016: Information Technologist

Best Free Software (not updated)

Rick Graziani Playlists of networking
videos on YouTube Cisco, IPv6,

Free Networking Videos by Prof. Messer

Free Security+ Videos by Prof. Messer
Free Networking Videos by ITFreeTraining
CompTIA Exams
Discounts for Students

Final Exam Schedule for all Classes (pdf)

Certified Ethical Hacker

CNT 7501 White Hat Hacker -
Network Defense and Penetration Testing
3 Units

If you are enrolled in this course, the online part of the course can be found on Canvas
For Username, enter your W number.
For Password, enter the first two letters of your first name, followed by the first two letters of your last name (all lowercase), followed by the last four digits of your W number. Change your password for added security.
Example: Maria Valdez with a W number of W98765432 would enter password mava5432

canvas login

Course Description
White Hat and Penetration testing training covers the concepts, use and appropriate application of Penetration Testing software and utilities in Ethernet networks. Students will explore the ethical use of security tools and countermeasures. Students are required to sign the "White Hat Oath" agreement of Ethical and Professional Conduct. The course will include: hacking methods, tools, their use and detection; penetration testing and countermeasures; exploits, vulnerability assessment in computers and networks, hands-on practice in a sandbox environment. Tools used include Wireshark, White hat/Pen test tools for Windows, OSX, Linux.
Recommended previous classes: One or more of CNT52 Networking Fundamentals, CNT 8001 Cisco, or CNT55 Windows Servers (completed with a grade of "C" or higher) or the equivalent industry experience.
To take this class, you must have daily access to a computer with an Internet access, and experience using a web browser. You will also need to understand how your college email account works with the Canvas Online Learning Management System..

Students learn how hackers attack computers and networks, and how to protect systems from such attacks, using both Windows and Linux systems. Students will learn legal restrictions and ethical guidelines, and will be required to obey them. Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, exploiting Windows and Linux vulnerabilities, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.

Upon successful completion of this course, the student will be able to:
Explain what an ethical hacker can and can not do legally, and explain the credentials and roles of penetration testers.
Define the types of malicious software found in modern networks.
Explain the threats and countermeasures for physical security and social engineering.
Perform footprinting to learn about a company and its network.
Perform port scans to locate potential entry points to servers and networks.
Perform enumeration (finding resources, accounts, and passwords) on Microsoft, Netware, and Unix/Linux targets.
Perform very simple programming in C, HTML, and Perl, specifically oriented towards the needs of network security professionals.
Learn how to identify Microsoft Windows vulnerabilities and to harden systems.
Learn how to identify Linux vulnerabilities and to protect servers.
Describe how to take control of Web Servers, and how to protect them.
Locate and hack into wireless networks, and protect them.
Explain how cryptography and hashing work, and perform attacks against them such as password cracking and man-in-the-middle attacks.
Describe and deploy security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.

SLO - Student Learning Outcomes (measured to guide course improvements)
Perform port scans to locate potential entry points to servers and networks.
Locate and hack into wireless networks, and protect them.

Face-to-face / Online hybrid Classes
This class is being taught as a hybrid class.
Please, don't believe the myth that learning online requires less effort than learning face-to-face.
This course covers the same content and has similar activities as the face-to-face version of the course; only the method of delivery changes.

Obtaining the CEH Certification

You may schedule, and take a test on almost any day of the year by contacting Prometric or Vue at

Text: Hands-On Ethical Hacking and Network Defense
by Michael T. Simpson
Publisher: Cengage Learning
Print ISBN: 9781435486096, 1435486099
eText ISBN: 9781133169031, 1133169031
Edition: 2nd
available on
ACM netlab
Optional Texts: The Digital Library will give access to 500+ online books on most IT topics. Student subscription: $ 19/year. EXCELLENT DEAL.
Other Optional Materials: USB external disk; any size
NDG Netlab+ by Network Development Group, Inc.
From anywhere, you will be able to log in and do most networking operations as if you were on site. The simple step-by-step instructions will guide you for setting up and configure the remote equipment.
After receiving your login credentials, go to
netlab server in network
How remote virtual labs work. Click for larger image.
Click for larger image.

Optional Online Orientation for new students
Students enrolled in online and hybrid courses are welcome to attend on-campus or live, virtual orientations held the week before the semester begins and during the first week of classes. These orientations are designed to familiarize you not only with Online Learning in general, but also with utilizing Canvas. They are not course-specific.
Learn how to access the online, virtual orientation.

Contact method for course work: Canvas course online.
Contact method for personal or immediate reply: Cell/text : _____________
Paper mail: Las Positas College, 3000 Campus Hill Drive, Livermore, CA 94551
Instructor Website:
This page can be found at --> Faculty & Staff button in mid screen --> Faculty Websites in the left column --> any link with the word (Daoud).

Office hours do NOT require appointments. Just show up at the place and time listed below.
Listed office hours are "official" office hours.
Contact me by text or email for other arrangements.
Monday Tuesday Wednesday Thursday Friday

Office Hour: 1:30 PM - 2:30 PM in Room 805 (Cisco Lab)

  1st Wed.: Town Hall Meeting: 2:30 - 4:30 pm.
3rd Wed.: Division Meeting: 2:30 - 4:30 pm.

 4th Fri.: Distance Education. Committe 10:00-12:00

CIS 65 Intro to Desktop Operating Systems CRN 20286 or CNT 50 CRN 20316 02:30 PM - 06:20 PM Room 805

Office Hours: 4:30 PM - 6:00 PM in Room 805 (Cisco Lab)

   Office Hours:
12:00-2:00PM PM in Room 805 (Cisco Lab)

CNT 7285 CRN 22724 Cloud Infrastructure- Amazon AWS Cloud Foundation Cert. + CompTIA Cloud+ Cert. Prep. 6:30-08:45PM Room 805

CNT 7401 CS 41 INTRO TO LINUX, UNIX, LINUX+ CRN 20628 or CIS 41, CRN 32440 6:30-8:50PM Room 805



Aug. 19 Fall semester classes begin. See the Schedule of Classes for late-start classes.
Aug. 19 - Sept. 2 Late enrollment for full-term classes – on a space available basis. Register online through CLASS-Web or in-person with add authorization number
Aug. 19 Associate Degree and/or Certificate of Achievement filing period begins through Oct. 26
Aug. 30 Last day to ADD/DROP with no Grade-of-Record - In Person (full-term classes)
Aug. 31 - Sept. 1 College closed - no Saturday/Sunday classes
Sept. 2 Labor Day - College Closed
Sept. 2 Last day to ADD/DROP with no Grade-of-Record - Online (full-term classes)
Sept. 3 CENSUS date (full-term classes only)
Sept. 20 Last day to request Pass/No Pass (full-term classes)
Oct. 22 FLEX Day (8:00am - 4:00pm)
Oct. 25 Deadline to apply for an Associate Degree and/or Certificate of Achievement
Nov. 8 Last day to WITHDRAW with a "W" - In Person (full-term classes)
Nov. 11 Last day to WITHDRAW with a "W" - Online (full-term classes)
Nov. 11 Veteran's Day - College Closed
Nov. 27 - 30 Thanksgiving recess – College closed (no Saturday/ Sunday classes)
Dec. 13 Last day of Instruction
Dec. 16 - 20 Final Examination Period
Dec. 21 - January 1, 2020 Winter Recess – No Instruction
Jan. 2, 2020 Instructors – Fall grades due by 11pm via CLASS-Web
Evaluation and Grading
Final grades are determined through a weighted average of mid-term and final examinations, quizzes, laboratory assignments, homework assignments, and class attendance and participation.
90%+ = A; 80% to 89% = B; 70% to 79% = C; 60% to 69% = D; 59% & below = F.
Final grades will be posted on the school website; usually within two weeks of the end of semester. If you need to know your grade sooner, contact the instructor.

Late Coursework:
All assignments are to be turned in on the due date. Students may be allowed to make up any late work by prior arrangement with the instructor. I try to accommodate most students, but very few excuses are accepted.

Parking Permits Available Online
Parking permits must be purchased on CLASS-Web. You will need the license number and description of the vehicle you wish to purchase a permit for and a printer to print your temporary permit. The actual hanging permit will be mailed to the address you provide when applying for your permit. Vehicles not displaying a valid permit, (hanging-type semester permit, temporary permit or daily permit from parking lot machines,) will be cited, even you own a parking permit. If you left it at home, you may buy a daily permit or contact the security office in building 1725 and ask for a temporary permit.
Permit Costs for Semester Permits. Vehicles: $40 per semester. Motorcycles: $30 per semester. Vehicles visiting: 30 minutes; free in marked spaces only.
Daily permit: $3 at the ticket machines on various parking lots.
Spaces for the handicapped: must show placard and pay the regular fee. Park your car head-in only. Do not park backwards, or you'll be cited. More info...
Receive a text message to your cell phone in case of an emergency at LPC.
will allow the school management to broadcast critical information, in real time, to the mobile devices of staff and students.
Text 55155 and type LPC.
Campus Security Office: 925 424 1690
Campus Security Emergencies: (925) 424-1699
*16 from Campus Pay Phones Emergency call-boxes
Adding/Dropping a course
You may use CLASS-Web on the Internet to drop or add a course from the school home page at . CLASS-Web is an online system that allows students to register, add, and drop classes, review academic schedules, check grades, view unofficial transcripts, access financial aid information, and pay student fees.
Remember! If you enroll in a class and decide not to attend, you are responsible for dropping the class. Don’t assume you will be dropped by your instructor or that the system will drop you automatically. If you fail to withdraw by the deadline the instructor must issue a grade.

Attendance - California Education Code (Title 5) on Excessive Absences
Due to the voluminous variety of knowledge required of professionals in information technology the industry, it is expected for you to attend every class session for the entire class time. Make arrangements with the instructors about hybrid classes. The Las Positas attendance policy will be observed: A student absent for a total of four consecutive or six cumulative instructional hours (1 instructional hour = 50 minutes) and/or two consecutive weeks of instruction may be dropped from that course by the instructor.
In order to be counted present, you must be present for the entire class period. If you need to leave a class session early, please inform me before class begins. Arriving to class late or leaving class early may result in at least one instructional hour of absence depending on the time
In the event that you experience a personal or familial hardship that causes an absence, you are till responsible for the material covered. Our online material has lectures that can assist in learning the many topics, and I am willing to help during contact hours. It is your responsibility to officially drop the course if you choose not to complete it.
If you wish to drop the course at any time for any reason, fill out the appropriate paperwork at the Office of Admissions and Records. Students who do not report to class on the first day may be dropped. Do not assume that I will drop you from the course. If you stop attending the class and do not drop the class after census day, you will receive an F in the class. See the schedule of important dates for deadlines for withdrawing from the course.
  Back to top

Classroom Etiquette
Cell phones should be either turned off or set to silent mode during class. Take your emergency calls outside the class room. Please, put away your smartphones, Ipods, mp3 player during class times. You may bring a laptop computer to class for class work only; not for playing games, chatting, reading the news, checking sports results, or watching funny videos.
During lectures, you are expected to participate. If you are sleepy or distracted, do not come to class. Lenghty texting is not participating. If you wear earphones during lectures, you are not participating. Whispering to the student sitting next to you is very distracting to your classmates and to the instructor.

Official Student Responsibilities and Behaviors
Student Conduct and Due Process

Missed Classes
The student is responsible for obtaining material distributed on class days when he/she was absent. This can be done by contacting a classmate who was present or by contacting the instructor.

Academic Honesty
All work that you submit in this course must be your own, it is a violation of academic integrity to copy someone else's work or to permit another person to copy your work. If any similarity in form or notation is noticed, the instructor retains the right to give a failing grade for the assignment, exam, and/or course.
Students found cheating (fraud, deceit, or dishonesty in an academic assignment) and/or plagiarizing (using another’s work as your own) will receive a zero for the assignment or exam and the incident will be reported to the dean of student services. LPC's policy on academic dishonesty can be found at

Need for Assistance
If you have any condition, such as a physical or learning disability, which will make it difficult for you to carry out the work as I have outlined it, or which will require academic accommodations, please notify me as soon as possible for special arrangements.
  Back to top

Saving copies of your class work
You may use a portable storage device to save your class materials..
Popular sites for computer parts: and
To locate the class PowerPoint presentations, notes and other student materials used in our class, do the following.
From any computer on campus, double click on the Student Files icon Marvin the Martian, double click on your instructor's folder, double click on your class folder.
If you don't see the Student Data icon, tap the Windows Start button, type \\marvin --> Enter.
Printing your work
This class rareley requires any printed work. Most materials may be submitted digitally. If you wish to print your work at school, you will need a computer print card, which can be purchased from the bookstore or from the Computer Lab (Room 803). - Color printing   is also available in Room 803- $.50 per page from PCs at pods L and M.

Policy | Student Agreement | Code of Ethics |

Resources, programs, and services available to Las Positas College students

Admissions and Records
(925) 424-1500
dearney @
Building 700
Applications • Registration • Records

Assessment / Tutorials and Testing
(925) 424-1475
ptrummel @
Building 1000
Tutors • Instructors • Placement Testing

Associated Students (ASLPC)
(925) 424-1490
staff @
Building 1700
Student Government • Meetings • Activities

(925) 424-1252
snavarro @
Room 2115
Intramurals • Intercollegiate Sports • Classes

(925) 424-1432
ktomlinson @
Building 900
Housing Scholarship • Child Care • CalWORKs Jobs

Career / Transfer Center
(925) 424-1423
Building 900
Career Testing • Career Information • Transfers

Computer Center
(925) 424-1144
gjohns @
Room 803

Early Childhood Education
(925) 424-1187
(925) 424-1135
Room 2136
Training • Professional Development

English Center
cahre @
Building 400
Developmental English • Instructors/Staff

(925) 424-1593
dscott @
Room 1504
Book Grants • Priority Registration • Counseling

Financial Aid/Veteran's Office
(925) 424-1580
lpcfinaid @
Room 1509
Registration Fee Waivers • Grants • Loans

(925) 424-1151
Building 2000
Reference • Research Skills Instruction • Internet Access • Online Databases • Print and AV Materials

LPC Distance Education Support
(925) 371-1142
LPCdistEd @
Login Problems • Assignment Submission Problems • General Distance Ed Info

Peer Support Network
(925) 424-1217
ejones @
Room 1200
Support Groups • Trained Listeners • Stress Help

Re-Entry Student Services
(925) 424-1412
bmorrissey @
Room 704
Transitional Classes • Counseling • Support

Student Health Center
(925) 424-1830
Building 1700
Treatment • Advice • Referrals

Campus Safety and Security
Emergency (925) 424-1699
Business (925) 424-1690
Room 1605
Parking• Student Escorts • Lost and Found

 Back to top
The Computer Center (room 803) is available to students as an open lab with Internet-connected computers and technical support from assistants on site. The Lab is equiped with over a hundred PCs and Macs, printing (color too), headphones, scanners, assistive technology, on a drop-in basis.
The Computer Center supports all disciplines including Online Learning courses.
Hours: Monday-Thursday 7:30am-9:30pm. Friday 8:30am-3:00pm
LPC Library Databases: Articles in Magazines, Journals, Newspapers, and Reference Sources

Free Microsoft Software and Discounted Non Microsoft Software
- The MSDN Academic Alliance/MS Imagine offers free MS software to LPC students who are enrolled in computing and business classes. The list of software packages is HERE.
- or, both take you to the same deals. offers both Microsoft and non Microsoft products, some at an 85% discount. At JourneyEd registration, sign up as a Chabot student using the same W number.
- Free Microsoft Office 365:
Sign up using an OR email address as a username at:
More info found at Student Life section of LPC website:
- The Microsoft Student Store is here .
- An alternative to obtain access to free Microsoft Imagine (Former DreamSpark) is to join the Association for Computing Machinery ( Student cost: $19/year. As part of the membership you get access to most of the MSDNAA catalog. You also get access to hundreds of books and white papers.
- for more free stuff.
- Best Free Software - Compiled by the instructor
 Back to top

Class Schedule and Course Outline

Wk Date Lecture Hands-on Labs NETLAB+ PPTs on
1 Monday, January 14, 2019 Chapter 1: Ethical Hacking Overview.
Introduction to ethical hacking concepts, including the term ethical hacker, as well as penetration and security tests and the differences between them. Students will learn the differences between the terms hacker, cracker, and script kiddies. Next, they will learn about the white box, black box, and gray box models for conducting penetration testing. Certifications are an important part of the professional life of any security tester; this chapter presents an overview of the major certification programs available for security professionals. Finally, students will learn about the legal aspect of ethical hacking; specifically, what they can and cannot do legally.
  Monday, January 21, 2019 HOLIDAY - Martin Luther King, Jr. (no instruction)  

2 Monday, January 28, 2019 Chapter 2: TCP/IP Concepts Review.
Major concepts and aspects of the TCP/IP protocol, including each of the four layers of the protocol stack: Application, Transport, Internet, and Network. Students will also review the IP addressing schemes and how they relate to TCP/IP protocol and security. Finally, the chapter ends with a discussion of three numbering systems commonly used with TCP/IP: binary, octal, and hexadecimal. Students will learn how to convert from one system to other
Netlab 13 Exploitation with IPv6
1. Pinging IPv6 Addresses and Monitoring IPv6 Traffic
2. IPv6 Scanning and Exploitation
3. Post IPv6 Exploitation with NCAT
3 Monday, February 04, 2019 Chapter 3: Network and Computer Attacks.
Malicious software, sometimes referred to as malware, includes viruses, Trojan horses, and worms. Students will learn about different types of malware and network attacks and how to protect their resources from them. The chapter explains the physical aspect of security and why it is essential for security and network professionals to pay attention to physical security.
Netlab 11 Using Metasploit to Attack a Remote System
Scanning Networks, Enumeration, Sniffers
Evading IDS, Firewalls, and Honeypots
1. Copying a Web Site and Stealing Credentials with a Sniffer
2. Sending the Spear Phish Email to the Victim
3. Exploiting the Victim Machine
4 Monday, February 11, 2019 Chapter 4: Footprinting and Social Engineering.
This chapter describes footprinting, a technique used to find network information. A list of several free web tools that can be used for security testers, or attackers, for footprinting is provided. Students will learn about competitive intelligence and why it is important for an organization. Next, they will learn how to gather more information when footprinting a network using DNS. Finally, this chapter presents a discussion on social engineering. Social engineers target the human resources of a network to find its vulnerabilities or perpetrate an attack.

Netlab 2 Conducting Active and Passive Reconnaissance Against a Target
1. Performing External Active Reconnaissance
2. Performing Internal Active Reconnaissance
3. Performing Internal and External Passive Reconnaissance
Netlab 12 Using Armitage to Attack the Network
Footprinting and Reconnaissance, Scanning Networks, System Hacking, Penetration Testing
1. Using Armitage to Attack the Internet Facing Device
2. Using Armitage to Attack the Internal Server 2008
3. Using Armitage to Attack the Internal Windows XP Machine

  Monday, February 18, 2019 Chapter 5: Port Scanning.
Find out what services a network host offers. Every service is related to a port. Port scanning programs are automated tools that ping each port on a network computer. If the port answers back, the port scanning program knows that port is alive (open). Open ports represent an invitation for an attack. Attackers can use the list of open ports and what services are related to them and search on the Internet for well-known vulnerabilities associated with those services.
Netlab 7 Breaking Windows Passwords
1. Creating Users in Windows
2. Breaking Windows Passwords
3. Dumping Windows Passwords in Clear Text
5 Monday, February 25, 2019 HOLIDAY - Presidents’ Weekend (no instruction)  
6 Monday, March 04, 2019 Netlab 9 Using Spear Phishing to Target an Organization
System Hacking, Social Engineering, Session Hijacking
1. Setting up the Attacker Machine
2. Sending the Spear Phish Email to the Victim
3. Exploiting the Victim Machine
Netlab 16 SQL Injection

1. Extracting Information from the Database Using SQL Injection
2. Making the Poison Ivy Payload (remote trojan)
3. Using the xp_cmd shell to upload and launch a Malicious Payload
Netlab 3
Using the SYSTEM account
1. Introduction to Windows Accounts
2. Using the SYSTEM Account on a Local Machine
3. Using the SYSTEM Account on a Remote Machine

7 Monday, March 11, 2019 Chapter 6: Enumeration.
Enumeration involves connecting to a system and obtaining information about users, passwords, and shared resources. Students will learn what tools can be used to enumerate Windows systems. Next, they will learn how to enumerate NetWare OSs. Finally, this chapter presents tools to enumerate *nix OS targets.
Netlab 1 Using Active and Passive Techniques to Enumerate Network Hosts
Introduction to Ethical Hacking, Scanning Networks, Enumeration. Sniffers
1. Discovering Hosts with Nmap and Zenmap
2. Discovering Hosts with Windows Command Line Tools
3. Discovering Hosts with Metasploit and Cain
8 Monday, March 18, 2019 Chapter 7: Programming for Security Professionals.
This chapter introduces basic programming concepts. It starts by explaining the C programming language syntax and its basic functions. Then, students will learn to create Web pages using HTML. HTML is a formatting language rather than a programming language. Next, the chapter describes Perl and shows how to create basic Perl scripts. Finally, students will be introduced to object-oriented programming, an alternative way to create computer programs.
Netlab 6 Utilizing Malware - Dark Comet
System Hacking, Trojans and Backdoors, Viruses and Worms
1. Setting up the DarkComet Client (Server)
2. Using the xp_cmd shell to upload and launch a Malicious Payload
3. Exploiting the Victim Machine

  Monday, March 25, 2019 SPRING BREAK (no instruction) (no Saturday classes)  
  Monday, April 01, 2019 Deadline to apply for an Associate Degree and/or Certificate of Achievement  

9 Monday, April 01, 2019 Chapter 8: Embedded Operating Systems.
This chapter examines how security testing is used to analyze operating system vulnerabilities and correct them. It reviews how to discover and fix these vulnerabilities on Windows, as well as Linux operating systems. Students will learn about the available assessment tools, in addition to several countermeasures for making these operating systems less vulnerable to common problems.
Netlab 5 Using the SHARK Remote Administration Tool
1. Setting up the SHARK Remote Administration Tool Client (Server)
2. Leveraging the Insider Threat to Deploy a Malicious Payload
3. Exploiting the Victim Machine with the SHARK Remote Administration Tool

Netlab 17
Launching a Buffer Overflow
System Hacking
10 Monday, April 08, 2019 Chapter 9: Linux Operating System Vulnerabilities.
This chapter provides an introduction to embedded operating systems. Students will learn what embedded operating systems are, how to identify vulnerabilities, and practices used to protect them. These devices shouldn’t be ignored simply because they’re small, perform simple tasks, or haven’t been exploited in the past. Security professionals should understand that any vulnerability in a desktop or server OS might exist for its embedded counterpart.
Netlab 8 Using John the Ripper to Crack Linux Passwords
11 Monday, April 15, 2019 Chapter 10: Hacking Web Servers.
This chapter describes Web applications and their components. Students will learn about Web applications and their vulnerabilities. The chapter also explores several tools used to attack Web servers.
Netlab 18 Intrusion Detection
Evading IDS, Firewalls, and Honeypots
1. Introduction to Snort
2. Analyzing Internal Network Traffic with Snort
3. Analyzing External Network Traffic with Snort
12 Monday, April 22, 2019 Chapter 11: Hacking Wireless Networks.
This chapter provides an overview of wireless technology. Students will learn about different wireless networking standards. Next, they will learn the process of authentication in relation to wireless networks. Wardriving and other wireless hacking techniques are also described. Finally, students will practice using the hacking tools that are utilized by hackers and security professionals to either attack or protect a wireless network.
Netlab 10 Breaking WEP and WPA Encryption
1. Wireless Commands and Tools
2. Examining Plain text Wireless Traffic
3. Cracking and Examining Wired Equivalent (WEP) Privacy Traffic
4. Cracking and Examining Wi-Fi Protected Access (WPA) Traffic

14 Monday, April 29, 201 Chapter 12: Cryptography.
This chapter describes the history of cryptography. It also explains several symmetric and asymmetric cryptography algorithms. Students will learn about the similarities and differences between symmetric and asymmetric cryptography. The chapter also explains public key infrastructure (PKI) and when it is appropriate to use. Finally, students will learn about possible attacks to cryptosystems.
Netlab 19 Using Certificates to Encrypt Email
1. Capturing Plain Text Email Traffic with tcpdump
2. Analyzing Plain Text Email Traffic
3. Capturing Encrypted Email Traffic with tcpdump
4. Analyzing Encrypted Email Traffic
15 Monday, May 06, 2019 Netlab 14 Creating MSFPAYLOADS Pen Testing
1. Creating the Payload and Starting the Listener
2. Convincing the Victim to Launch the Malicious File
3. Exploiting the Victim Machine using SQL Injection
Netlab 4 Poison Ivy – Remote Access Trojan
System Hacking, Trojans and Backdoors, Viruses and Worms
1. Setting up the Poison Ivy Client (Server)
2. Convincing the Victim to Launch the Malicious File
3. Exploiting the Victim Machine with Poison Ivy
16 Monday, May 13, 2019 13: Protecting Networks with Security Devices.
This chapter describes several network protection systems that security professionals and network administrators can use to better protect their networks. Students will learn about firewall technologies and how they can contribute to make a network safer. Students will also learn about intrusion detection systems and intrusion prevention systems and their role in network defense. Finally, the chapter introduces the concept of honeypots and explains how they can be used to better understand the techniques of hackers.
Netlab 15 Abusing SYSTEMS
1. Using Bruter Against a Target
2. Website Defacement
3. Denial of Service
17 Monday, May 20, 2019 Final exam prep. and review.  

May 22
Final Examination 3:30–5:20pm      











































 LPC HomeLPC Library 
3000 Campus Hill Drive Livermore CA 94551-7623 | Tel. 925.424.1000 | Fax 925.443.0742
Copyright © 2019. All Rights Reserved.
Please address questions and comments to the Webmaster.