Learning Outcomes
Upon completion of the course, students will be able to
- explain the basic principles and techniques related to how cyber criminals can gain access to IT systems
- assess and evaluate the strengths and weaknesses of IT systems in terms of data security
- implement solutions to strengthen IT security in IT systems
- perform and present ethical pen tests for educational purposes
Course Content
The course begins with a brief description of important concepts needed for ethical hacking, such as operating systems, software, network protocols, network functions, virtualisation, cloud computing and the way cyber attacks can be carried out.
Aspects that are covered are scouting and information search, as well as identification of the target IT system. Network scanning of the target computer network and network services by vulnerabilities are described.
Assessment
- Lab reports (5 credits).
- Project, assignment and seminar (2.5 credits).
Forms of Study
Lectures, lessons and assignments.
Grades
The Swedish grades U–VG.
Lab reports, U-G
Project, assignment and seminar U-VG
Prerequisites
- 60 credits in the main field of study Microdata Analysis including Script Programming, 7.5 credits, Data Communication II 7.5 credits and Dynamic Web Applications, 7.5 credits
Other Information
Overlaps GDT28Y.