This course provides an introduction to ethical hacking, which involves attempting to penetrate secure systems in order to demonstrate vulnerability so that steps can be taken to mitigate the risk. Students will develop an understanding of some of the techniques that can be used to assess the security of information-sharing systems and networks, and to defend against threats to those systems through physical and electronic means.
Learning Outcomes.
Learning Outcomes.
Curriculum
teacher profile teaching materials
Recap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Programme
Unit 0 - RecapRecap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Core Documentation
Baloch Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2015.Type of delivery of the course
Lectures and laboratory activitiesType of evaluation
The final evaluation consists of a written exam and a lab activity teacher profile teaching materials
Recap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Programme
Unit 0 - RecapRecap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Core Documentation
Baloch Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2015.Reference Bibliography
Christen Markus, Gordijn Bert, and Loi Michele. The ethics of cybersecurity. Springer Nature, 2020. Mohit. Python Penetration Testing Essentials. Packt Publishing, 2018. Khrais Hussam. Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python. Packt Publishing, 2018. Sabih Zaid. Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing. Packt Publishing, 2018. Velu Vijay Kumar. Mastering Kali Linux for Advanced Penetration Testing. Packt Publishing, 2017.Type of delivery of the course
Lectures and laboratory activitiesType of evaluation
The final evaluation consists of a written exam and a lab activity teacher profile teaching materials
Recap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Programme
Unit 0 - RecapRecap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Core Documentation
Baloch Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2015.Type of delivery of the course
Lectures and laboratory activitiesType of evaluation
The final evaluation consists of a written exam and a lab activity teacher profile teaching materials
Recap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Programme
Unit 0 - RecapRecap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Core Documentation
Baloch Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2015.Reference Bibliography
Christen Markus, Gordijn Bert, and Loi Michele. The ethics of cybersecurity. Springer Nature, 2020. Mohit. Python Penetration Testing Essentials. Packt Publishing, 2018. Khrais Hussam. Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python. Packt Publishing, 2018. Sabih Zaid. Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing. Packt Publishing, 2018. Velu Vijay Kumar. Mastering Kali Linux for Advanced Penetration Testing. Packt Publishing, 2017.Type of delivery of the course
Lectures and laboratory activitiesType of evaluation
The final evaluation consists of a written exam and a lab activity