The course begins with a brief description of important concepts needed for ethical hacking, such as operating systems, software, network protocols, network functions, virtualization, cloud computing and how cyber-attacks can be carried out.
Aspects that are covered are scouting and information search, as well as identifying the target IT system. Network scanning of the target computer network and network services by vulnerabilities are described.
The course describes how vulnerabilities in the OS, applications, protocols, and network functions can be identified and they can be exploited to escalate privilege, exfiltrate data or cause harm.
The course further describes how to protect IT systems against attacks, as well as incident management and intrusion detection solutions.
Simple encryption algorithms, reverse engineering of software and how malware works are also covered in the course.
EU/EEA Citizens or exchange students are not required to pay fees.
.