Learning Outcomes
Upon completion of this course, students will be able to:
- explain the basic principles and techniques of how attackers can enter computer systems.
- put acquired knowledge into practice by performing ethical penetration tests and hide the intrusion.
- perform analyses of data breaches and audits of information technology security.
- evaluate the strengths and weaknesses of various information technology solutions in terms of data security.
- independently present and perform demonstrations of pen-tests for educational purposes.
- evaluate the societal role of hacking from a social, ethical and economic standpoint
Course Content
The course initially describes how different operating systems, software, networks and protocols work. After this, the most common phases of data attacks are described, including
- reconnaissance and information retrieval.
- Scanning and mapping of systems.
- The means of gaining access via the OS, applications and networks.
- The escalation of rights in computer systems.
- The creation of backdoors and maintenance of access to the computer system.
- The hiding of traces of the intrusion.
When the attacks are presented, countermeasures and protection against them are described.
An individual project in a relevant subject concludes the course. Results are presented in a written report and orally in a seminar.
Assessment
The examination partially consists of six labs with written reports (4. 5 credits); oral supplements are used. As well as an individual project with a deeper study of a relevant subject, the results of which are presented in a written report and orally in a seminar. (3 credits).
Forms of Study
The student will acquire knowledge and skills primarily through independent study.
The base material for the studies consists of lectures, homework, assignments, seminars and required reading.
Grades
The Swedish grades U–VG.
Labs U-G.
The final grade of the course is decided by the grade of the indivdual project.
Prerequisites
- Fundamentals of programming 7,5 credits
- Introduction to Operating Systems 7.5 HEC Undergraduate Level 1 or equivalent knowledge
Other Information
The course can be given as campus and/or via distance learning.
If the course is offered via distance learning, the student must arrange for access to a sufficiently powerful computer with current Microsoft Windows OS and internet connection of at least 2 Mbit/s. Moreover, a webcam and a headset with microphone is needed.
Replaces DT1036.