College of Engineering and Polymer Science

Date of Last Revision

2023-05-06 08:19:19


Computer Information Systems

Honors Course

CPSC 498

Number of Credits


Degree Name

Bachelor of Science

Date of Expected Graduation

Spring 2023


A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.

Research Sponsor

Dr. John Nicholas

First Reader

Douglas Hubert

Second Reader

Stanley Smith

Honors Faculty Advisor

Sara Hoge

Proprietary and/or Confidential Information




To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.