In this subject students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.
Upon successful completion of this subject, students should:
- be able to plan, design and manage a security review;
- be able to critically analyse the difference between shell and terminal access and describe the advantages of each;
- be able to investigate the key points of vulnerability scanning and analyse the results;
- be able to describe the concepts of reconnaissance and understand how to obtain information during this phase;
- be able to distinguish between the legal issues that surround penetration testing;
- be able to demonstrate advanced techniques for breaking and exploiting password flaws.
The subject will cover the following topics:
- Footprinting, Scanning and Enumeration.
- Penetration Testing, System Hacking, Session Hacking and Linux Hacking.
- Trojans, Back Doors, Viruses and Worms.
- Denial of Service.
- Social Engineering.
- Hacking networks and exploiting vulnerabilities.
- SQL Injections.
- Physical Security.
- Evading IDS, Firewalls and Honeypots.
- Buffer Overflows.
Please note that the information above should be used as a guide only as the actual content of subjects is changed regularly to reflect the latest industry trends and student feedback.