Teaching Responsibility

LJMU Schools involved in Delivery:

LJMU Partner Taught

Learning Methods

Lecture
Practical

Module Offerings

5716YCOM-JAN-PAR

Aims

To familiarize students with common penetration testing techniques, security issues and software vulnerabilities as well as the methods, tools and techniques that can be used during penetration testing to detect such vulnerabilities. To provide students with an understanding of techniques that should be applied through a penetration testing methodology in order to test for system insecurity.

Learning Outcomes

1.
Analyse software for vulnerabilities.
2.
Apply a range of techniques to detect software insecurity.
3.
Demonstrate awareness of the technical issues and complexity surrounding software security assessment.
4.
Investigate software vulnerabilities through performing penetration tests

Module Content

Outline Syllabus:Software vulnerability analysis Low level programming language analysis in a security context Analysis and exploitation of data structures Practical penetration and software testing Operating system security Use of exploitation tools Bug and exploitation hunting
Additional Information:Students will produce a report discussing aspects of penetration testing and vulnerability analysis. They will consider the various stages of a penetration testing lifecycle and the necessary technologies available in performing software tests. This module follows on from skills developed in the Operating System module and prepares students for a boarder discussion of ethical hacking topics covered in the final year.

Assessments

Technology
Report