Semester 3 / ECTS Credits: 6 ECTS
The main objective of this course is to give a short and focused introduction to ethical hacking, with particular emphasis on Cybersecurity from the other perspective.
Students will gain comprehensive knowledge of the topic covered with the theories, concepts, and practices.
Throughout this course, hacking procedures will be discussed with provided real-world examples and practical workouts on how to approach target machine, how to learn about target machine by passive and active measures and how to exploit discovered vulnerabilities. The student will learn about the most important steps in ethical hacking process and how to use specific methods to exploit and assess target machine.
The course will cover multiple operating systems from Windows, Linux, iOS, Android and others. This will enable student to use specific techniques for penetration testing in real life scenarios. Students will also gain knowledge about policies, laws and ethics, since subject learned in class could be misused.
Practical skills of ethical hacking will be gained through working on real-life scenarios / case-studies during 20 hours of laboratory workouts.
- Compare methodologies of ethical hacking
- Analyze information of network information systems
- Identify threats to information system
- Categorize data and information of IS
- Use of tools and techniques of ethical hacking
- Formulate vulnerabilities of IS
Course content lectures:
- Introduction to Ethical Hacking
- Footprinting and reconnaissance
- Scanning networks and Enumeration
- System hacking
- Trojans, backdoors, viruses and worms
- Social engineering
- Denial of Service
- Session hijacking
- Hacking webservers and web applications
- Sql injection
- Hacking wireless networks
- Hacking mobile devices
- Evading IDS, firewalls and honeypots
- Buffer overflow