Teaching Responsibility
LJMU Schools involved in Delivery:
Computer Science and Mathematics
Learning Methods
Lecture
Practical
Module Offerings
7141COMP-JAN-CTY
Aims
To gain a significant understanding of various security vulnerabilities and cyber threats to computer systems/applications as well as the importance of cyber security. To assess critically a variety of ethical hacking tools and penetration testing techniques for the protection and evaluation of computer systems and applications. To promote the use of appropriate ethical security techniques to solve cyber security problems. To understand practices of malware and intrusion analysis to aid cyber threat intelligence gathering. To develop independent research skills in threat intelligence to detect, respond to, and defeat focused and targeted threats.
Learning Outcomes
1.
Deploy ethical hacking tools and techniques to complex computer systems
2.
Demonstrate critical awareness of recent developments in ethical hacking techniques
3.
Critically review developments in system defence, response and intelligence techniques.
Module Content
Outline Syllabus:
Introduction to Ethical Hacking:
- Penetration testing lifecycle
- Cyber Kill Chain
- MITRE ATT&CK
- Legal and Ethical considerations
Ethical Hacking Fundamentals:
- Network scanning
- Enumeration
- Vulnerability scanning
System Hacking:
- Vulnerability exploitation
- Hacking web applications
- Password attacks
- Exploit frameworks
- Exploit development
- Post exploitation processes
Malware:
- Malware detection techniques
- Anti-detection techniques
- Reverse engineering basics
Defensive Security:
- Intrusion detection and prevention
- Monitoring & SIEM
- Cyber Threat Hunting
Introduction to Ethical Hacking:
- Penetration testing lifecycle
- Cyber Kill Chain
- MITRE ATT&CK
- Legal and Ethical considerations
Ethical Hacking Fundamentals:
- Network scanning
- Enumeration
- Vulnerability scanning
System Hacking:
- Vulnerability exploitation
- Hacking web applications
- Password attacks
- Exploit frameworks
- Exploit development
- Post exploitation processes
Malware:
- Malware detection techniques
- Anti-detection techniques
- Reverse engineering basics
Defensive Security:
- Intrusion detection and prevention
- Monitoring & SIEM
- Cyber Threat Hunting
Module Overview:
This module will help you to gain a significant understanding of various security vulnerabilities and cyber threats to computer systems/applications as well as the importance of cyber security. This will help you to assess critically a variety of ethical hacking tools and penetration testing techniques for the protection and evaluation of computer systems and applications.
The module will promote the use of appropriate ethical security techniques to solve cyber security problems. This will help you to understand practices of network forensics and intrusion analysis to aid cyber threat intelligence gathering. In doing so, you will develop independent research skills in threat intelligence to detect, respond to, and defeat focused and targeted threats.
This module will help you to gain a significant understanding of various security vulnerabilities and cyber threats to computer systems/applications as well as the importance of cyber security. This will help you to assess critically a variety of ethical hacking tools and penetration testing techniques for the protection and evaluation of computer systems and applications.
The module will promote the use of appropriate ethical security techniques to solve cyber security problems. This will help you to understand practices of network forensics and intrusion analysis to aid cyber threat intelligence gathering. In doing so, you will develop independent research skills in threat intelligence to detect, respond to, and defeat focused and targeted threats.
Additional Information:
The spectacular growth of the Internet has spawned a great demand for secure computer systems. Ethical hacking can help to assess the cyber security defence of computer systems. Intrusion detection and firewalls provide additional layers of defence for the detection and prevention of cyber-attacks on computer systems. This module examines various cyber security issues and solutions within these areas.
The spectacular growth of the Internet has spawned a great demand for secure computer systems. Ethical hacking can help to assess the cyber security defence of computer systems. Intrusion detection and firewalls provide additional layers of defence for the detection and prevention of cyber-attacks on computer systems. This module examines various cyber security issues and solutions within these areas.