This course provides an introduction to ethical hacking, which involves attempting to penetrate secure systems in order to demonstrate vulnerability so that steps can be taken to mitigate the risk. Students will develop an understanding of some of the techniques that can be used to assess the security of information-sharing systems and networks, and to defend against threats to those systems through physical and electronic means.
Learning Outcomes.
Learning Outcomes.
Curriculum
teacher profile teaching materials
Recap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Programme
Unit 0 - RecapRecap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Core Documentation
Baloch Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2015.Type of delivery of the course
Lectures and laboratory activitiesType of evaluation
The final evaluation consists of a written exam and a lab activity teacher profile teaching materials
Recap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Programme
Unit 0 - RecapRecap on networks
Recap on Python programming and virtual machines
Unit 1 - Introduction to ethical hacking
The “ethical hacking” concept
Vulnerability assessment
Ethical hacking reports and documents
Unit 2 - Target information gathering
Scanning
Sniffing
Social engineering
Password hacking
Unit 3 - Active ethical hacking
Web hacking
Denial of Service attacks
Wireless hacking
Unit 4 - Hands-on ethical hacking
Lab experiences concerning the different course units
Core Documentation
Baloch Rafay. Ethical hacking and penetration testing guide. Auerbach Publications, 2015.Type of delivery of the course
Lectures and laboratory activitiesType of evaluation
The final evaluation consists of a written exam and a lab activity