Teaching Responsibility
LJMU Schools involved in Delivery:
LJMU Partner Taught
Learning Methods
Lecture
Practical
Module Offerings
5716YCOM-JAN-PAR
Aims
To familiarize students with common penetration testing techniques, security issues and software vulnerabilities as well as the methods, tools and techniques that can be used during penetration testing to detect such vulnerabilities.
To provide students with an understanding of techniques that should be applied through a penetration testing methodology in order to test for system insecurity.
Learning Outcomes
1.
Analyse software for vulnerabilities.
2.
Apply a range of techniques to detect software insecurity.
3.
Demonstrate awareness of the technical issues and complexity surrounding software security assessment.
4.
Investigate software vulnerabilities through performing penetration tests
Module Content
Outline Syllabus:Software vulnerability analysis
Low level programming language analysis in a security context
Analysis and exploitation of data structures
Practical penetration and software testing
Operating system security
Use of exploitation tools
Bug and exploitation hunting
Additional Information:Students will produce a report discussing aspects of penetration testing and vulnerability analysis. They will consider the various stages of a penetration testing lifecycle and the necessary technologies available in performing software tests. This module follows on from skills developed in the Operating System module and prepares students for a boarder discussion of ethical hacking topics covered in the final year.
Assessments
Technology
Report