course-details-portlet

TTM4536

Ethical Hacking - Information Security, Specialization Course

Credits 7.5
Level Second degree level
Course start Autumn 2015
Duration 1 semester
Language of instruction English
Examination arrangement Portfolio assessment

About

About the course

Course content

The course covers the main techniques used by computer hackers and penetration testers in order to better defend against intrusions and security violations in live systems, including low-level kernel and hardware topics, techniques for web applications, exploit techniques, rootkits and some audit techniques used in digital forensics.

Learning outcome

A. Knowledge: Students will learn the underlying principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. They will become familiar with the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation and result reporting. B. Skills: For every offensive penetration technique the students will learn the corresponding remedial technique. By this, the students will develop a practical understanding of the current cybersecurity issues and the ways how the errors made by users, administrators, or programmers can lead to exploitable insecurities.

Learning methods and activities

Lectures, seminars, invited lectures, student presentations and laboratory exercises.

Portfolio assessment is the basis for the grade in the course. The portfolio includes a practical ethical hacking task which counts 50% and a oral final exam which counts 50%. The results for the parts are given in %-scores. The entire portfolio is assigned a letter grade. The oral exam is given in English only.

Course materials

1. "Gray Hat Hacking The Ethical Hacker's Handbook", Fourth Edition, by Daniel Regalado et al., McGraw-Hill Education, January 5, 2015,
2. "Black Hat Python: Python Programming for Hackers and Pentesters", First Edition, by Justin Seitz, December 14, 2014
3. "The Hacker Playbook: Practical Guide To Penetration Testing", by Peter Kim, January 1, 2014

Credit reductions

Course code Reduction From
TTM4535 7.5 sp
This course has academic overlap with the course in the table above. If you take overlapping courses, you will receive a credit reduction in the course where you have the lowest grade. If the grades are the same, the reduction will be applied to the course completed most recently.

Subject areas

  • IKT
  • Sivilingeniør
  • Technological subjects
  • Telematics

Contact information

Course coordinator

Lecturers

Department with academic responsibility

Department of Information Security and Communication Technology

Examination

Examination

Examination arrangement: Portfolio assessment
Grade: Letters

Ordinary examination - Autumn 2015

Arbeider
Weighting 50/100
Muntlig eksamen
Weighting 50/100 Date 2015-12-02 Time 09:00

Re-sit examination - Summer 2016

Arbeider
Weighting 50/100
Muntlig eksamen
Weighting 50/100