Abstract
In this subject students will learn how to test computing systems for vulnerabilities and secure them against hacking. Students will learn how attackers find weaknesses in a computing environment, and be asked to critically evaluate system defences intended to prevent such attacks. Students will become familiar with perimeter and endpoint … For more content click the Read More button below.
Syllabus
Footprinting, scanning and enumerationSystem hacking and penetration testingTrojans, back doors, viruses and wormsNetwork traffic sniffingDenial of serviceSocial engineeringIdentifying and exploiting network vulnerabilitiesCross-site scripting and SQL injectionPhysical securityEvading IDS, firewalls and honeypotsBuffer overflowsCryptography
Learning outcomes
Upon successful completion of this subject, students should:
1.
be able to identify and analyse information system weaknesses, and demonstrate how these make an environment vulnerable to attack;
2.
be able to use reconnaissance and analysis tools and techniques to understand an environment and identify threats;
3.
be able to compare and effectively utilise open source threat intelligence resources when analysing possible threats;
4.
be able to prioritise and implement countermeasures to prevent attackers causing harm to information systems; and
5.
be able to analyse and compare common web application attack techniques, and justify defences that mitigate these attacks.
Assumed knowledge
ITI581 Network Security Fundamentals or ITC595 Information Security
Enrolment restrictions
Only available to students enrolled in IT Masters relevant courses.