
Ethical hacking
- Class 30
- Practice 30
- Independent work 150
Course title
Ethical hacking
Lecture type
Elective
Course code
22-02-521
Semester
2
ECTS
7
Lecturers and associates
Course overview
This module is designed for students to learn insight of current security scenario and increasing hacking attempts on various information systems. The goal of the ethical hacking and countermeasures is to help the organizations take pre-emptive measures against malicious attacks by attacking the system themselves and staying within legal limits. This module provides students with an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures.
Content
This module was developed to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology. This gives students the opportunity to demonstrate the knowledge and skills needed to perform the job of an ethical hacker. Students will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
Through the labs students will have practical experience with the most common tools used by hackers. This module will enable students to have the knowledge and understanding to or develop more advanced skills and become an expert in Cyber Security such as Penetration tester and/or Digital forensic examiner.
Literature
1. [Anon.] (2020). Ethical Hacking, Albuquerque: Ec-Council
Additional reading
1. Walker M., (2019). CEH Certified Ethical Hacker All-in-One Exam Guide, 4th Edition, New York: McGraw-Hill Education
2. Maurushat, A., (2019). Ethical Hacking. Ottawa: University of Ottawa Press.
Minimal learning outcomes
- Apply reconnaissance methods
- Apply vulnerability detection methods
- Apply methods of social engineering
- Apply methods of intrusion into the systems
- Apply methods of maintaining access and deleting traces
- Apply system testing methods
Preferred learning outcomes
- Analyse reconnaissance methods
- Analyse vulnerability detection methods
- Analyse methods of social engineering
- Analyse methods of intrusion into the systems
- Analyse methods of maintaining access and deleting traces
- Analyse system testing methods