COM642 Ethical Hacking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

MODULE SPECIFICATION PROFORMA

How to optimise your use of the templat


Module specification proforma
Module Code: COM642

Module Title: Ethical Hacking

Level: 6 Credit Value: 20

Cost
GAPC JACS3 code: I190
Centre(s):

Arts, Science and Module


Faculty: Dr. Paul Comerford
Technology Leader:

Scheduled learning and teaching hours 24 hrs


Guided independent study 176 hrs
Placement 0 hrs
Module duration (total hours) 200 hrs

Programme(s) in which to be offered (not including exit awards) Core Option


BSc (Hons) Cyber Security  ☐
BSc (Hons) Computer Networks and Security  ☐
BSc (Hons) Applied Cyber Security  ☐

Pre-requisites

None

Office use only


Initial approval: 30/08/2018 Version no:2
With effect from: 01/09/2018
Date and details of revision: Jan 22: addition of BSc Applied Cyber Security Version no:
Module Aims

The module aims to give students a solid and professional level of competence in the field of
ethical hacking, which is predominantly led by the coverage of tools, techniques and systems
that allow penetration testing to be carried out on computer systems and networks. Much of
the module material follows the footsteps of a would-be intruder and thus includes coverage
of the communication and social side of computer attacks as well as the technological.
Having been led to understand how systems, software and devices can be vulnerable to
unwanted penetration, students will then investigate countermeasures and organisational
strategies to mitigate these risks. The module leans towards practical skills and content, but
is strongly underpinned by theory and current research.

Intended Learning Outcomes

Key skills for employability

KS1 Written, oral and media communication skills


KS2 Leadership, team working and networking skills
KS3 Opportunity, creativity and problem solving skills
KS4 Information technology skills and digital literacy
KS5 Information management skills
KS6 Research skills
KS7 Intercultural and sustainability skills
KS8 Career management skills
KS9 Learning to learn (managing personal and professional development, self-
management)
KS10 Numeracy

At the end of this module, students will be able to Key Skills


KS1 KS4
Differentiate between a range of threats and techniques used KS5 KS 6
1
in attacks on computer systems

KS 1 KS 3
Investigate ethical and legal issues surrounding cyber
2 KS 4 KS 5
security
KS 6 KS 9
KS 1 KS 3
Evaluate computer systems and networks to identify
3 KS 4 KS 5
weaknesses and vulnerabilities in an ethically sound manner
KS 6 KS 10
KS 2 KS 3
Synthesise a series of technological interventions to address
4 KS 4 KS 9
computer security problems
KS10
Transferable skills and other attributes
• Personal motivation, organisation and time management
• Ability to collaborate and plan
• Written and verbal communication skills
• Research and analytical skills
Derogations

None

Assessment:

Indicative Assessment Tasks:

Reflecting the nature of the learning outcomes, assessment is divided between evaluation of
students’ acquisition of theory, current research, and practical abilities. In the first
component, students will be required to produce a report based upon recent or emerging
types of cyber attack. They should describe these attacks and their solutions at a deep,
technical level and contextualise them from data, privacy, ethical, legal, and social
perspectives. The second assignment will require students to demonstrate their practical
abilities in the domain of penetration testing, information gathering, and problem-solving
abilities. For example, students in this assignment may role play attacker and system
administration in a type of ‘war game’ before swapping roles.
Learning Word count
Assessment Weighting Duration
Outcomes to Type of assessment (or equivalent if
number (%) (if exam)
be met appropriate)
1 1, 2 Report 40 2,000
2 3, 4 Practical 60 3 hours

Learning and Teaching Strategies:

This module has an emphasis in the practical issues related to Ethical Hacking and will be
delivered using a combination of formal lecturers, tutorials, practical demonstrations and lab
sessions. The split between theory and practical teaching and learning is approximately 40%
and 60% respectively. The formal delivery will be supplemented by reading materials, such
as academic papers and industry technology reports, which will be made available via the
University’s VLE.

Syllabus outline:
 Information gathering and social engineering
 Ports and protocols
 Data privacy
 Attacks from within an organisation
 Penetration testing and fuzzing
 Exploiting vulnerabilities
 Windows and Linux local system exploits and attacks
 Software vulnerabilities
 Ethics of penetration testing
 Wireless network attacks
 Smartphone and mobile device exploits
 Cyber crime and the law
 Logging and responding to incidents
 Disaster and recovery strategies
Indicative Bibliography:

Essential reading
McClure, S., Scambray, J., and Kurtz, G. (2012). Hacking Exposed: Network Security Secrets
and Solutions. 7th ed. New York: McGraw-Hill/Osborne.

Shema, M. and Johnson, B.C. (2014), Anti-Hacker Tool Kit. 4th ed. New York: McGraw-
Hill/Osborne.

Wrightson, T. (2014). Advanced Persistent Threat Hacking: The Art and Science of Hacking
any Organization. New York: McGraw-Hill/Osborne.

Weidman, G., (2014). Penetration Testing: A Hands-on Introduction to Hacking. No Starch


Press.

Other indicative reading

Conheady, S. (2014). Social Engineering in IT Security: Tools, Tactics and Techniques. New
York: McGraw/Osborne.

IEEE Security & Privacy Magazine, IEEE


Computers and Security (journal), Elsevier Publishing
Journal of Cybersecurity, Oxford University Press
Journal of Cyber Security Technology, Taylor and Francis

You might also like