Return to homepage Skip to navigation Skip to site search Skip to main content Skip to footer

Module Catalogue

SCQF Level: 08  

Module Code: CMP210

Credit Value: 20  

Year: 2017/8

Term: Term 1

School: School of Arts, Media and Games

Description

This module develops a critical understanding of the tools used by Ethical Hackers to examine the security of a device or network. Students will systematically investigate a computer network for possible vulnerabilities.

Aims

The aim of this module is to provide the student with the ability to assess the security of a computer system.

Learning Outcomes

By the end of this module the student should be able to:

1.  Undertake research to select appropriate methods of investigating the security of a computer network.

2.  Evaluate and assess the security of a typical computer system.

3.  Document details of an ethical hacking methodology.

Indicative Content

1 Footprinting

Determining the location of a company. Examining computer networks using passive techniques.

2 Search Engines

Using Search Engines to find ethical hacking information. Information limiting.

3 Scanning

Using tools to scan for IP addresses and operating systems in use on a network or in an organisation. Identify services that are running on a network. Different types of port scans and useful tools.

4 Enumeration

Tools and techniques for enumerating networks and identifying exploitable shares, usernames and E-Mail addresses.

5 System Hacking

Privilege Escalation, Keystroke Loggers. Mitigations against keyloggers. Operating System and Application Hacking. Examining and exploiting System flaws. Understanding the need to install and patch applications.

6 Header 6

What are the principle vulnerabilities that computer systems are exposed to? How are they exploited. What are the techniques that can be used to assess them and the security of a system?

7 Development of supporting documentation

Example-led consideration of how to write clearly and concisely.

Statement on Teaching, Learning and Assessment

The lectures and practicals will assist students in developing an understanding of the shape, history and the contemporary dynamic of Ethical Hacking. The module is underpinned by legal, ethical and professional issues. Students will produce a report and presentation that presents their findings and suggests how this information could be protected. This module employs a problem-first and practice-led learning approach. Ethical Hacking techniques and methodologies will be introduced through a practical and exploratory approach and within the context of developing a secure system. This activity will constitute 75% of the contact time. Once expertise is established the general contribution of the technique or methodology to the wider area of Ethical Hacking will be reinforced in theory.

Teaching and Learning Work Loads

Total 200
Lecture 15
Tutorial/Seminar 0
Supervised Practical Activity 45
Unsupervised Practical Activity 0
Assessment 60
Independent 80

Back


Guidance notes:

Credit Value – The total value of SCQF credits for the module. 20 credits are the equivalent of 10 ECTS credits. A full-time student should normally register for 60 SCQF credits per semester.

Disclaimer: We make every effort to ensure that the information on our website is accurate but it is possible that some changes may occur prior to the academic year of entry. The modules listed in this catalogue are offered subject to availability during academic year 2017/18 , and may be subject to change for future years.

Top