Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Practical
Module Offerings
6217COMP-SEP-CTY
Aims
To gain a significant understanding of various security vulnerabilities and cyber threats to computer systems/applications as well as the importance of cyber security.
To assess critically a variety of ethical hacking tools and techniques for the protection and evaluation of computer systems and applications.
To promote the use of appropriate security techniques to solve cyber security problems.
Learning Outcomes
1.
Identify ethical, legal, and social issues around the use of hacking tools
2.
Critically review existing research-based defence solutions
3.
Plan and deploy appropriate solutions in relation to practical network security problems
4.
Critically analyse ethical hacking methods for the evaluation of network security
Module Content
Outline Syllabus:Ethical hacking: fundamentals and concepts
Open Source Intelligence
Security vulnerabilities and detection
Attack foot printing
Attack scanning techniques
System hacking methods
Network and device hacking techniques
Web application vulnerabilities and attacks
Exploit development and defence
Ethical hacking reporting
Responding and security solutions
Ethical, Legal and Social: UK, EU and International Cybercrimes laws and regulations.
Module Overview:
The growth of the Internet has spawned a great demand for secure computer systems. Ethical hacking provides the concept for finding vulnerabilities before real attackers do so that vulnerabilities can be fixed and associated risks mitigated. It also helps to test the cyber security defence of computer systems. In this module you will examine various ethical hacking concepts, tools, and techniques that provide solutions to fix identified threats
The growth of the Internet has spawned a great demand for secure computer systems. Ethical hacking provides the concept for finding vulnerabilities before real attackers do so that vulnerabilities can be fixed and associated risks mitigated. It also helps to test the cyber security defence of computer systems. In this module you will examine various ethical hacking concepts, tools, and techniques that provide solutions to fix identified threats
Additional Information:The growth of the Internet has spawned a great demand for secure computer systems. Ethical hacking provides the concept for finding vulnerabilities before real attackers do in other for these vulnerabilities to be fixed and associated risks mitigated. It also helps to test the cyber security defence of computer systems. This module examines various ethical hacking concepts, tools, techniques and provides solution to fix identified threats.