TTM4536 - Ethical Hacking - Information Security, Specialization Course


Examination arrangement

Examination arrangement: Portfolio assessment
Grade: Letters

Evaluation form Weighting Duration Examination aids Grade deviation
work 40/100 A
work 60/100

Course content

The course covers the main techniques used by computer hackers and penetration testers in order to better defend against intrusions and security violations in live systems, including low-level kernel and hardware topics, techniques for web applications, exploit techniques, rootkits and some audit techniques used in digital forensics.

Learning outcome

A. Knowledge: Students will learn the underlying principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. They will become familiar with the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation and result reporting. B. Skills: For every offensive penetration technique the students will learn the corresponding remedial technique. By this, the students will develop a practical understanding of the current cybersecurity issues and the ways how the errors made by users, administrators, or programmers can lead to exploitable insecurities.

Learning methods and activities

Lectures, seminars, invited lectures, student presentations and laboratory exercises.

Further on evaluation

Portfolio assessment is the basis for the grade in the course. The portfolio includes practical ethical hacking tasks which counts 40% and an oral final exam which counts 60%. The results for the parts are given in %-scores. The entire portfolio is assigned a letter grade.
The oral exam is given in English only.
If a student also after the re-sit exam has the final grade F/failed, the student must repeat the entire course. Works that count in the final grade must be repeated.

Course materials

1. "Black Hat Python: Python Programming for Hackers and Pentesters", First Edition, by Justin Seitz, December 14, 2014
2. "Gray Hat Hacking The Ethical Hacker's Handbook", Fourth Edition, by Daniel Regalado et al., McGraw-Hill Education, January 5, 2015,
3. "The Hacker Playbook: Practical Guide To Penetration Testing", by Peter Kim, January 1, 2014

Credit reductions

Course code Reduction From To
TTM4535 7.5 01.09.2008

Version: 1
Credits:  7.5 SP
Study level: Second degree level


Term no.: 1
Teaching semester:  AUTUMN 2020
Extraordinary deadline for course registration: 2020-06-01

No.of lecture hours: 1
Lab hours: 4
No.of specialization hours: 7

Language of instruction: English

Location: Trondheim

Subject area(s)
  • Telematics
  • Technological subjects
Contact information
Course coordinator: Lecturer(s):

Department with academic responsibility
Department of Information Security and Communication Technology



Examination arrangement: Portfolio assessment

Term Status code Evaluation form Weighting Examination aids Date Time Digital exam Room *
Autumn ORD work 40/100 A
Room Building Number of candidates
Summer UTS work 40/100 A
Room Building Number of candidates
Autumn ORD work (1) 60/100

Release 2020-11-18

Submission 2020-11-21

Release 00:00

Submission 00:00

Room Building Number of candidates
Summer UTS work 60/100
Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.
  • 1) Merk at eksamensform er endret som et smittevernstiltak i den pågående koronasituasjonen. Please note that the exam form has changed as a preventive measure in the ongoing corona situation.

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU