This module develops a critical understanding of the tools used by Ethical Hackers to examine the security of a device or network. Students will systematically investigate a computer network for possible vulnerabilities.
The aim of this module is to provide the student with the ability to assess the security of a computer system.
By the end of this module the student should be able to:
1. Undertake research to select appropriate methods of investigating the security of a computer network.
2. Evaluate and assess the security of a typical computer system.
3. Document details of an ethical hacking methodology.
Determining the location of a company. Examining computer networks using passive techniques.
2 Search Engines
Using Search Engines to find ethical hacking information. Information limiting.
Using tools to scan for IP addresses and operating systems in use on a network or in an organisation. Identify services that are running on a network. Different types of port scans and useful tools.
Tools and techniques for enumerating networks and identifying exploitable shares, usernames and E-Mail addresses.
5 System Hacking
Privilege Escalation, Keystroke Loggers. Mitigations against keyloggers. Operating System and Application Hacking. Examining and exploiting System flaws. Understanding the need to install and patch applications.
What are the principle vulnerabilities that computer systems are exposed to? How are they exploited. What are the techniques that can be used to assess them and the security of a system?
7 Development of supporting documentation
Example-led consideration of how to write clearly and concisely.
Statement on Teaching, Learning and Assessment
The lectures and practicals will assist students in developing an understanding of the shape, history and the contemporary dynamic of Ethical Hacking. The module is underpinned by legal, ethical and professional issues. Students will produce a report that presents their findings and suggests how this information could be protected. This module employs a problem-first and practice-led learning approach. Ethical Hacking techniques and methodologies will be introduced through a practical and exploratory approach and within the context of developing a secure system. This activity will constitute 75% of the contact time. Once expertise is established the general contribution of the technique or methodology to the wider area of Ethical Hacking will be reinforced in theory.
Teaching and Learning Work Loads
|Supervised Practical Activity||26|
|Unsupervised Practical Activity||13|
Credit Value – The total value of SCQF credits for the module. 20 credits are the equivalent of 10 ECTS credits. A full-time student should normally register for 60 SCQF credits per semester.
We make every effort to ensure that the information on our website is accurate but it is possible that some changes may occur prior to the academic year of entry. The modules listed in this catalogue are offered subject to availability during academic year 2019/10 , and may be subject to change for future years.