Ethical Hacking and Penetration Testing
2015-2016 - IMT3491 - 5 ECTS


IMT2282 Operating systems

On the basis of

Master students must document that they have achieved learning outcomes equivalent to IMT2282 Operating systems

Expected learning outcomes


  • Explain how a penetration test is planned, executed, documented and terminated.
  • Account for vulnerabilities in general and common services running on internal and external servers for a generic company.
  • Predict client side vulnerabilities and use the new methods for security breaches that may occur here.


  • Master the most common hacking and penetration testing tools and apply these tools to perform simple penetration testing tasks.
  • Carry out structured and effective search for security issues in computer systems and computer networks.
  • Construct  effective penetration tests given existing threats towards software, networks, and network services.
  • Use and abuse access to one system in order to gather more information about the networks and services used by this system.

General competence:

  • Awareness of vulnerabilities in software both at server and client side, with an extra focus on network applications.
  • Sensitivity for potential vulnerabilities in the computer systems and networks of a generic company, and ability to make an analysis of potential threats based on a network description.
  • Overview of a wide set of tools for testing and accessing systems and networks.


  • Ethical hacking and penetration testing – definitions
  • Penetration testing methodologies
  • Hands-on penetration testing

Teaching Methods

Group works
Laboratory work

Teaching Methods (additional text)

The course will be made accessible for both campus and remote students. Every student is free to choose the pedagogic arrangement form that is best fitted for her/his own requirement. The lectures in the course will be given on campus and are open for both categories of students. All the lectures will also be available on Internet through GUC’s learning management system (Fronter).

Form(s) of Assessment

Written exam, 2 hours
Evaluation of Project(s)
Digital exam

Form(s) of Assessment (additional text)

  •  Written OR digital exam (66%), depending on the number of students the exam might be oral
  •  Project work (34%)
  •  Both parts must be passed

Grading Scale

Alphabetical Scale, A(best) – F (fail)

External/internal examiner

Evaluated by internal examiner. External examiner is used periodically (every four years, next time in 2014/2015).

Re-sit examination

  • No re-sit examination – projects and exam are closely connected and related
  • New project(s) and new exam(s) at next course dates

Examination support


Coursework Requirements

One or two approved exercises, further information announced at course start.

Teaching Materials

Engebretson, P. (2013). The Basics of Hacking and Penetration Testing 2nd Ed.

Supporting literature

Regalado, D., Harris, S., Harper, A., Eagle, C., Ness, J., Spasojevic, B., Linn, R., Sims, S. (2015): Gray Hat Hacking The Ethical Hacker's Handbook 4th Ed.

Additional information

In case there will be less than 5 students that will apply for the course, it will be at the discretion of the responsible for the study programme whether the course will be offered or not an if yes, in which form.

There will also be an upper limit to the class based on available laboratory resources.