Learning Outcomes
At the end of this course, students should be able to:
1. describe the concept of ethical hacking, attacks, threats, hackers, measures and
countermeasures;
2. differentiate between attacks and threats and examine the ethical hacker strategies and
understand their methods;
3. review how perimeter defences work, how intruders escalate privileges and methods of
security systems, intrusion detection, policy creation, and social engineering;
4. explores techniques and technologies for understanding the operation of malicious
software and attacks, and learn system hacking, malware threats, sniffing, social
engineering, physical security, and password vulnerabilities – cracking passwords;
5. plan reverse engineering of code and network exploits as a method for understanding and
development of countermeasures;
6. develop attack phases, secure network infrastructure hacking methodology, ethical
hacking plans, footprinting and reconnaissance, and scanning networks; and
7. discuss denial of service, session hijacking, hacking web servers, hacking web applications,
SQL injection, hacking wireless networks, hacking mobile platforms, and how to evade
IDs, firewalls, and honeypots.
Course Contents
Introduction to ethical hacking, attacks, threats, hackers, measures and countermeasures.
Overview of ethical hacker strategies. Focus on how perimeter defences work, how intruders
escalate privileges and methods of security systems. Intrusion detection, policy creation, social
engineering. Techniques and technologies for understanding the operation of malicious
software and attacks. Threats and defence mechanisms. Attack phases. Secure network
infrastructure. DDoS attacks, buffer overflows and virus creation. Network Infrastructure
Attacks, Hacking Methodology, Developing ethical hacking plans. Footprinting and
reconnaissance. Scanning Networks. Enumeration and system hacking. Malware threats.
Sniffing. Social engineering. Physical security. Password vulnerabilities – cracking passwords.
Denial of Service. Session hijacking. Hacking web servers. Hacking web applications. sql
injection, hacking wireless networks. Hacking mobile platforms. Evading IDS, Firewalls, and
Honeypots. Explores techniques and technologies for understanding the operation of malicious
software and attacks. Techniques for detection, identification and prevention. Reverse
engineering of code and network exploits as a method for understanding and development of
countermeasures.
Lab work: Practice the ethical hacker strategies and methods. Work on a sample perimeter
defences and identify how intruders escalate privileges and methods of security systems.
Practical exercises on the techniques and technologies of malicious software and attacks.
Learn how to perform system hacking, mobile platform hacking, crack password, remove
introduced vulnerabilities and evade IDs, firewalls, and honeypots. Apply reverse engineering
of code and network exploits as a method for understanding and development of
countermeasures. Utilise foot printing and reconnaissance, and scanning networks.