TTM4536 - Ethical Hacking - Information Security, Specialization Course
The course covers the main techniques used by computer hackers and penetration testers in order to better defend against intrusions and security violations in live systems, including low-level kernel and hardware topics, techniques for web applications, exploit techniques, rootkits and some audit techniques used in digital forensics.
A. Knowledge: Students will learn the underlying principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. They will become familiar with the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation and result reporting. B. Skills: For every offensive penetration technique the students will learn the corresponding remedial technique. By this, the students will develop a practical understanding of the current cybersecurity issues and the ways how the errors made by users, administrators, or programmers can lead to exploitable insecurities.
Learning methods and activities
Lectures, seminars, invited lectures, student presentations and laboratory exercises. Two compulsory practical ethical hacking tasks; both tasks must be approved to qualify for the final exam.
- Work 1
- Work 2
Further on evaluation
Portfolio assessment is the basis for the grade in the course. The portfolio includes two practical ethical hacking tasks which each counts 20% and a oral final exam which counts 60%. The results for the parts are given in %-scores. The entire portfolio is assigned a letter grade. The oral exam is given in English only.
If a student also after the re-sit exam has the final grade F/failed, the student must repeat the entire course. Works that count in the final grade must be repeated.
Exam registration requires that class registration is approved in the same semester. Compulsory activities from previous semester may be approved by the department.
Recommended previous knowledge
TTM4135 Information Security and TTM4137 Wireless Network Security or equivalent.
1. "Black Hat Python: Python Programming for Hackers and Pentesters", First Edition, by Justin Seitz, December 14, 2014
2. "Gray Hat Hacking The Ethical Hacker's Handbook", Fourth Edition, by Daniel Regalado et al., McGraw-Hill Education, January 5, 2015,
3. "The Hacker Playbook: Practical Guide To Penetration Testing", by Peter Kim, January 1, 2014
Examination arrangement: Portfolio assessment
|Term||Statuskode||Evaluation form||Weighting||Examination aids||Date||Time||Room *|
- * The location (room) for a written examination is published 3 days before examination date.