On the basis of
IMT2282 Operating systems
Expected learning outcomes
The student will address the methodology of penetration testing, learning how penetration tests are constructed and experimenting with penetration testing tools in the laboratory. The student will look at vulnerabilities in software both at server and client side, with a high focus on network applications.
The students should after the end of the course have a good overview of how an effective penetration test should take place and of the threats that exists towards software, networks, and network services. A deeper analysis and a set of practical exercises will be the foundation for a deeper understanding into some specific security vulnerabilities that exists.
- Ethical Hacking and Penetration Testing – definitions
- Penetration Testingx¨ Methodologies
- Password attacks
- Privilege escalation
- Network mapping
- Software vulnerabilities
- Web application problems
- XSS, parameters, persistence
- Data mining
Form(s) of Assessment
Written exam, 2 hours
Evaluation of Project(s)
Form(s) of Assessment (additional text)
- Written exam (51%), depending on the number of students the exam might be oral
- Project work (49%)
- Both parts must be passed
Alphabetical Scale, A(best) – F (fail)
Evaluation by internal and external examiner
Ordinary re-sit examination
New project(s) at next course dates
2 approved exercises
Articles and book chapters. Specifics to be announced at course start.
In case there will be less than 5 students that will apply for the course, it will be at the discretion of the responsible for the study programme whether the course will be offered or not an if yes, in which form.