Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Practical
Module Offerings
5216COMP-JAN-CTY
Aims
To familiarize students with common penetration testing techniques, security issues and software vulnerabilities as well as the methods, tools and techniques that can be used during penetration testing to detect such vulnerabilities.
To provide students with an understanding of techniques that should be applied through a penetration testing methodology in order to test for system insecurity.
Learning Outcomes
1.
Analyse software for vulnerabilities.
2.
Apply a range of techniques to detect software insecurity.
3.
Demonstrate awareness of the technical issues and complexity surrounding software security assessment.
4.
Investigate software vulnerabilities through performing penetration tests
Module Content
Outline Syllabus:Software vulnerability analysis
Low level programming language analysis in a security context
Analysis and exploitation of data structures
Practical penetration and software testing
Operating system security
Use of exploitation tools
Bug and exploitation hunting
Module Overview:
In this module you will consider the various stages of a penetration testing lifecycle and the necessary technologies available in performing software tests. This module follows on from skills developed in the Operating System module and prepares you for a boarder discussion of ethical hacking topics covered in the final year. You will be familiarised with common penetration testing techniques, security issues and software vulnerabilities as well as the methods, tools and techniques that can be used during penetration testing to detect such vulnerabilities.
In this module you will consider the various stages of a penetration testing lifecycle and the necessary technologies available in performing software tests. This module follows on from skills developed in the Operating System module and prepares you for a boarder discussion of ethical hacking topics covered in the final year. You will be familiarised with common penetration testing techniques, security issues and software vulnerabilities as well as the methods, tools and techniques that can be used during penetration testing to detect such vulnerabilities.
Additional Information:Students will produce a report discussing aspects of penetration testing and vulnerability analysis. They will consider the various stages of a penetration testing lifecycle and the necessary technologies available in performing software tests. This module follows on from skills developed in the Operating System module and prepares students for a boarder discussion of ethical hacking topics covered in the final year.