The highly technical Ethical Hacking module commences by introducing you to the fundamental steps and frameworks needed for practical and ethical hacking exercises. You are then introduced to the Python programming language and the use of Python scripts for various ethical hacking activities, examples of which include; password cracking, port scanning, anonymous browsing, keyboard logging, screen capture and packet interception.
On successful completion of the module, students will be able to:
This module, being part of the innovative Cyber Security and Digital Forensics course, utilises a workshop-centered teaching and learning strategy, in which practical exercises and problem-centered technical challenges are supported by short participatory lectures and group discussions. Workshops are typically structured as a three-hour lab-based session, interspersed with 3 short (20 minute) participatory lecture sessions and are designed to encourage an open, collaborative and active student learning environment.
Content delivered in workshop sessions, are based on and reinforced by recommended reading, study guides and learning resources that are available on Canvas, which duly serves as a learning, sharing, feedback and communication hub for this module. Core teaching and learning strategies for this module are described as follows:
Definitive UNISTATS Category | Indicative Description | Hours |
---|---|---|
Scheduled learning and teaching | 75 x short (20-minute) participatory lectures 25 x three-hour laboratories | 100 |
Guided independent study | Independent and directed reading. Online learning materials and study notes. | 200 |
Total (number of credits x 10) | 300 |
In order to help students on this module achieve their full potential, formative assessment opportunities will be provided as appropriate throughout the module. Examples of formative assessments include worked exercises which emulate aspects of the major assessment and lab work. Feedback on coursework represents an additional opportunity for formative learning and will be given in writing and/or verbally. Formative feedback will be provided in various forms (eg. one-to-one short feedback sessions or group feedback). Formative feedback is designed to inform student preparation for summative assessments which may be within the same module or feed forward across the degree programme. The summative assessment for this module is 80% coursework, which typically consists of a Python scripting and ethical hacking coursework (eg. password cracker, keylogger etc.) and practical ethical hacking case study coursework. coursework will typically include demonstrable artefacts. The remaining 20% is allocated to a time limited practical exam, in which students undertake forensic investigations in the context of a given scenario and then answer a series of questions based to their analysis and interpretations.
Learning Outcome | Assessment Strategy |
---|---|
1. Comprehend and deploy the basic steps for penetration testing by utilising appropriate tools and techniques. | Practical ethical hacking case study coursework |
2. Analyse and interpret the outcomes of ethical hacking sessions. | Time-limited practical exam |
3. Build and modify Python scripts that can be used to conduct ethical hacking tasks and activities. | Python scripting and ethical hacking coursework |
Description of Assessment | Definitive UNISTATS Categories | Percentage |
---|---|---|
Python scripting and ethical hacking coursework | Coursework | 50% |
Practical ethical hacking case study coursework | Coursework | 30% |
Time-limited practical exam | Practical exam | 20% |
Total (to equal 100%) | 100% |
It IS NOT a requirement that any major element of assessment is passed separately in order to achieve an overall pass for the module.
Alphy Books (2017) "Hacking: Hacking With Python - The Complete Beginner's Course to Learn Ethical Hacking With Python in 7 Clear-Cut Lessons". Amazon Media EU
Engebretson, P (2011). "The basics of Hacking and Penetration Testing". Syngress
Tale, S (2017) "Hacking with Python: The Ultimate Beginners Guide". Amazon Media EU
Johansen, G et.al. (2016). "Kali Linux 2 - Assuring Security by Penetration Testing". Packt Publishing
Lubanovic, B (2015). "Introducing Python: Modern Computing in Simple Packages". O'Reilly Media
McGrath, M (2013). "Python in easy steps". In Easy Steps Limited
Sweigart, A (2013) "Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python". CreateSpace Independent Publishing Platform.
Graves, K (2010) "Certified Ethical Hacker". John Wiley & Sons.