Image for

Ethical hacking

  • Class 30
  • Practice 30
  • Independent work 150
Total 210

Course title

Ethical hacking

Lecture type


Course code






Lecturers and associates

Course overview

This module is designed for students to learn insight of current security scenario and increasing hacking attempts on various information systems. The goal of the ethical hacking and countermeasures is to help the organizations take pre-emptive measures against malicious attacks by attacking the system themselves and staying within legal limits. This module provides students with an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures.


This module was developed to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology. This gives students the opportunity to demonstrate the knowledge and skills needed to perform the job of an ethical hacker. Students will be exposed to an entirely different posture towards the responsibilities and measures required to be secure.
Through the labs students will have practical experience with the most common tools used by hackers. This module will enable students to have the knowledge and understanding to or develop more advanced skills and become an expert in Cyber Security such as Penetration tester and/or Digital forensic examiner.


1. [Anon.] (2020). Ethical Hacking, Albuquerque: Ec-Council

Additional reading

1. Walker M., (2019). CEH Certified Ethical Hacker All-in-One Exam Guide, 4th Edition, New York: McGraw-Hill Education
2. Maurushat, A., (2019). Ethical Hacking. Ottawa: University of Ottawa Press.

Download student guide

Minimal learning outcomes

  • Apply reconnaissance methods
  • Apply vulnerability detection methods
  • Apply methods of social engineering
  • Apply methods of intrusion into the systems
  • Apply methods of maintaining access and deleting traces
  • Apply system testing methods

Preferred learning outcomes

  • Analyse reconnaissance methods
  • Analyse vulnerability detection methods
  • Analyse methods of social engineering
  • Analyse methods of intrusion into the systems
  • Analyse methods of maintaining access and deleting traces
  • Analyse system testing methods