Ethical Hacking and Penetration Testing
IMT2282 Operating systems
The course will address the methodology of penetration testing, learning how penetration tests are constructed and experimenting with penetration testing tools in the laboratory. The course will look at vulnerabilities in software both at server and client side, with a high focus on network applications.
The students should after the end of the course have a good overview of how an effective penetration test should take place and of the threats that exists towards software, networks, and network services. A deeper analysis and a set of practical exercises will be the foundation for a deeper understanding into some specific security vulnerabilities that exists.
- Ethical Hacking and Penetration Testing – definitions
- Penetration Testingx¨ Methodologies
- Password attacks
- Privilege escalation
- Network mapping
- Software vulnerabilities
- Web application problems
- XSS, parameters, persistence
- Data mining
Skriftlig eksamen, 2 timer
Vurdering av prosjekt(er)
- Written exam (51%), depending on the number of student the exam might be oral
- Project (49%)
- Both parts must be passed
Bokstavkarakterer, A (best) - F (ikke bestått)
Evaluation by internal and external examiner
Utsatt eksamen (tidl. kontinuasjon)
- Ordinary re-sit examination
- New project(s) at next course dates
Tillatte hjelpemidler (gjelder kun skriftlig eksamen)
2 approved exercises
Articles and book chapters. Specifics to be announced at course start.
In case there will be less than 5 students that will apply for the course, it will be at the discretion of Studieprogramansvarlig whether the course will be offered or not an if yes, in which form.