Ethical Hacking (DAT505)
This course covers the fundamental concepts of ethical hacking and penetration testing. The course will provide a strong foundation for students who want to pursue a career in the field of ethical hacking. The course covers topics such as footprinting and reconnaissance, scanning and enumeration, social engineering, denial of service attacks, and web application attacks. The course also covers topics such as cryptography, viruses and worms, and honeypots. Students will use hack the box or similar vulnerable machines to test their skills.
Course description for study year 2023-2024. Please note that changes may occur.
Course code
DAT505
Version
1
Credits (ECTS)
5
Semester tution start
Autumn
Number of semesters
1
Exam semester
Autumn
Language of instruction
English
Content
Learning outcome
Knowledge
The course will provide you with a good understanding of the key concepts and vocabulary in Cyber Security, including attack vectors, possible threats, and their purpose.
The students will understand the fundamental principles for defending against cyber attacks and the most critical defense techniques. By the end of this course, students will be able to:
- Understand the basics of ethical hacking and penetration testing
- Perform footprinting and reconnaissance using open-source intelligence, hacker forums, exposed passwords
- Perform scanning and enumeration using nmap, Metasploit framework.
- Perform social engineering using theHarvester to collect victim organization’s emails, find login pages with Recon-Ng, inject backdoors
- Perform denial of service attacks with spoofing, smurf, reflection and packet amplification methods
- Perform web application attacks using sqlmap, CSRF, XSS attacks
- Understand cryptography
Skills
By the end of this course, students will be able to:
- Use hacking tools and techniques like nmap, metasploit, hping3, social engineering toolkit, Recon-Ng
- How to design malicious remote access trojans using msfvenom
- Understand the network packet manipulation techniques to bypass the firewalls
- How to perform buffer overflows on real world applications
- How to evade the antivirus software
Required prerequisite knowledge
Recommended prerequisites
Exam
Form of assessment | Weight | Duration | Marks | Aid |
---|---|---|---|---|
Written exam | 1/1 | 3 Hours | Letter grades | None permitted |