Search our site
Search our site

Ethical Hacking

  • Module code: CI5235
  • Year: 2018/9
  • Level: 5
  • Credits: 30
  • Pre-requisites: None
  • Co-requisites: None

Summary

The highly technical Ethical Hacking module commences by introducing you to the fundamental steps and frameworks needed for practical and ethical hacking exercises. You are then introduced to the Python programming language and the use of Python scripts for various ethical hacking activities, examples of which include; password cracking, port scanning, anonymous browsing, keyboard logging, screen capture and packet interception.

Aims

  • To enable students to apply appropriate tools for a range of practical ethical hacking activities.
  • To enable students to evaluate investigative ethical hacking activities in order to identify and mitigate security threats and vulnerabilities.
  • Introduce students to the Python programming language and its utility as a common ethical hacking resource.

Learning outcomes

On successful completion of the module, students will be able to:

  • Comprehend and deploy the basic steps for penetration testing by utilising appropriate tools and techniques.
  • Analyse and interpret the outcomes of ethical hacking sessions.
  • Build and modify Python scripts that can be used to conduct ethical hacking tasks and activities.

Curriculum content

  • Introduction to ethical hacking terms and concepts
  • Reconnaissance:
    • social engineering,
    • ping
    • HTTrack
    • Google
    • Whois)
  • Scanning:
    • port scanning
    • vulnerability scanning
    • penetration
  • Exploitation:
    • password resetting
    • sniffing network traffic
    • code injection
    • cross-site scripting,
    • Metasploit
    • John the Ripper
  • Maintaining access tools:
    • netcat
    • netbus
    • rootkits
  • Python Programming
    • Installation, selecting a Python IDE
    • Understanding variables
    • Getting user input
    • Working with strings
    • Working with numbers
    • Working with file I/O
    • Lists, tuples and dictionaries
  • Ethical hacking with Python
    • Passive forensics
    • Active surveillance
    • The Windows registry
    • Logging keyboard input
    • Taking screenshots
    • Local systems
    • Receiving commands
    • Exfiltration and deploying updates
    • Packet sniffing
    • Packet interception
    • ASP poisoning

Teaching and learning strategy

This module, being part of the innovative Cyber Security and Digital Forensics course, utilises a workshop-centered teaching and learning strategy, in which practical exercises and problem-centered technical challenges are supported by short participatory lectures and group discussions. Workshops are typically structured as a three-hour lab-based session, interspersed with 3 short (20 minute) participatory lecture sessions and are designed to encourage an open, collaborative and active student learning environment.

Content delivered in workshop sessions, are based on and reinforced by recommended reading, study guides and learning resources that are available on Canvas, which duly serves as a learning, sharing, feedback and communication hub for this module. Core teaching and learning strategies for this module are described as follows:

  • The topics of ethical hacking with python and ethical hacking tools and techniques, are delivered as introductory "step by step" tutorials, short lectures and practical labs.
  • Learning and discovery are reinforced through a DIY (Do It Yourself) practical approach, in which students self-enhance their reconnaissance, scanning, exploitation and access maintenance skills.
  • Active learning and skills retention are for ethical hacking concepts, tools and techniques are enhanced by formative self-study assessments, videos and interactive presentations that can be accessed on Canvas.

Breakdown of Teaching and Learning Hours

Definitive UNISTATS Category Indicative Description Hours
Scheduled learning and teaching 75 x short (20-minute) participatory lectures 25 x three-hour laboratories 100
Guided independent study Independent and directed reading. Online learning materials and study notes. 200
Total (number of credits x 10) 300

Assessment strategy

In order to help students on this module achieve their full potential, formative assessment opportunities will be provided as appropriate throughout the module. Examples of formative assessments include worked exercises which emulate aspects of the major assessment and lab work. Feedback on coursework represents an additional opportunity for formative learning and will be given in writing and/or verbally. Formative feedback will be provided in various forms (eg. one-to-one short feedback sessions or group feedback). Formative feedback is designed to inform student preparation for summative assessments which may be within the same module or feed forward across the degree programme. The summative assessment for this module is 80% coursework, which typically consists of a Python scripting and ethical hacking coursework (eg. password cracker, keylogger etc.) and practical ethical hacking case study coursework. coursework will typically include demonstrable artefacts. The remaining 20% is allocated to a time limited practical exam, in which students undertake forensic investigations in the context of a given scenario and then answer a series of questions based to their analysis and interpretations.

Mapping of Learning Outcomes to Assessment Strategy (Indicative)

Learning Outcome Assessment Strategy
1. Comprehend and deploy the basic steps for penetration testing by utilising appropriate tools and techniques. Practical ethical hacking case study coursework
2. Analyse and interpret the outcomes of ethical hacking sessions. Time-limited practical exam
3. Build and modify Python scripts that can be used to conduct ethical hacking tasks and activities. Python scripting and ethical hacking coursework

Elements of Assessment

Description of Assessment Definitive UNISTATS Categories Percentage
Python scripting and ethical hacking coursework Coursework 50%
Practical ethical hacking case study coursework Coursework 30%
Time-limited practical exam Practical exam 20%
Total (to equal 100%) 100%

Achieving a pass

It IS NOT a requirement that any major element of assessment is passed separately in order to achieve an overall pass for the module.

Bibliography core texts

Alphy Books (2017) "Hacking: Hacking With Python - The Complete Beginner's Course to Learn Ethical Hacking With Python in 7 Clear-Cut Lessons".  Amazon Media EU

Engebretson, P (2011). "The basics of Hacking and Penetration Testing". Syngress

Bibliography recommended reading

Tale, S (2017) "Hacking with Python: The Ultimate Beginners Guide".  Amazon Media EU

Johansen, G et.al. (2016). "Kali Linux 2 - Assuring Security by Penetration Testing". Packt Publishing

Lubanovic, B (2015). "Introducing Python: Modern Computing in Simple Packages". O'Reilly Media

McGrath, M (2013). "Python in easy steps". In Easy Steps Limited

Sweigart, A (2013) "Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python".  CreateSpace Independent Publishing Platform.

Graves, K (2010) "Certified Ethical Hacker".  John Wiley & Sons.

Find a course

Course finder

Find a course
>