3244 - Session-based subject

Ethical Hacking

Learn to use advanced methods in ethical hacking with the help of modern penetration testing frameworks in conventional ICT infrastructure and with disruptive technologies.

Level
Master
Location
Session-based
Points
7.5
Start date
09. May
Admission requirements
Form type
Full-time/Part-time
Subject code
3244
Subject description
No description

Ethical hacking within organizations is conducted by authorized professionals, known as ethical hackers or penetration testers, systematically probing information systems to identify and address security vulnerabilities. This technical process requires understanding networking protocols, operating systems, and application architectures. Ethical hackers use specialized tools and methodologies to simulate cyberattacks, aiming to uncover exploitable weaknesses. The process starts with scoping objectives, followed by reconnaissance, vulnerability scanning, and system enumeration. Using tools like Metasploit or Kali Linux, experts assess weaknesses, mimicking real adversaries. Findings are compiled into detailed reports with actionable recommendations. Through ethical hacking, organizations enhance defensive capabilities proactively. This course teaches advanced techniques applicable in modern

organizations utilizing disruptive technologies like Cloud and IoT. In this course, students will learn to demonstrate penetration testing applicability in various organizational scenarios, incorporating knowledge of network architecture, application stack, and data criticality. They will also gain an advanced understanding of network stack analysis across different layers and common network footprints of Linux and Windows services. Moreover, students will be able to formulate penetration testing strategies using standards and frameworks like PTES, MITRE ATT&CK, and OWASP.

Learning outcome

Students will develop skills such as utilizing OSINT tools like Shodan, Censys, and passive DNS services to map a target's attack surface. They will also learn to leverage advanced OS capabilities and analyze information from tools in packages like Kali Linux. Additionally, they will gain proficiency in developing and automating penetration testing routines in Python, bash script, or similar languages. Furthermore, students will be equipped to navigate and execute penetration testing routines in diverse networks, hybrid clouds, SaaS services, and disruptive technologies like IoT and Big Data.

General competencies include reflecting on test results, communicating information concisely to technical and non-technical personnel, and making actionable recommendations. Students will also discuss ways computer architecture can be analyzed from defensive and offensive perspectives and reflect on the need to update organizational policies, technological stacks, and implement additional protection mechanisms.

Subject details

This subject is included in
  • Enkeltemner master fast start og slutt