Abstract
This subject introduces students to key concepts and practices related to ethical hacking, emphasising an ethical approach through the use of an isolated test environment. Topics covered include footprinting, reconnaissance, network scanning, enumeration, malware, sniffing, and social engineering. Students will learn how to identify vulnerabilities in systems and understand how … For more content click the Read More button below.
Syllabus
Introduction to ethical hackingNetworking and security foundationsFootprinting and reconnaissanceScanning networksEnumerationSystem hackingMalware and sniffingSocial engineeringAttack and defenseSecurity architecture and designCloud Computing and the Internet of Things
Learning outcomes
Upon successful completion of this subject, students should:
1.
be able to perform reconnaissance, footprinting, network scanning, and enumeration;
2.
be able to identify vulnerabilities in systems and exploit them;
3.
be able to use methods to compromise a computer system’s security in an isolated test environment
4.
be able to intercept (sniff) network traffic that is traversing a network; and
5.
be able to compare effective countermeasures to prevent harm being done by malicious hackers.
Assumed knowledge
ITC106 and ITC292 and ITC358
Enrolment restrictions
Available to undergraduate students only.