UC3EAT05 Adversary Tools and Techniques
UC3EAT05 Adversary Tools and Techniques
- Course description
- NQF LevelBachelor's degree (Level 6 1. Cycle)
- Area of StudyComputing
- Program of StudyDigital Forensics and Incident Response
- ECTS05
- CampusKristiansand, OnlinePLUS - Oslo, Online
- Course LeaderEmlyn Butterfield
Language of Instruction and assessment: English
May be offered on Campus and Online.
May be offered as a separate course.
Included in the following bachelor's degrees:
- Digital Forensics and Incident Management
The course aims to provide students an insight into the tools and techniques used by adversaries to scan and compromise networks and systems to facilitate a better understanding to react, respond and mitigate future attacks.
Course Learning Outcomes
The student has knowledge of
K1 | common offensive standards, practices, and procedures. |
---|---|
K2 | offensive and defensive techniques that can be used in a security assessment or cyber attack. |
The student gain skills in
S1 | the methods that are used by adversaries to scan and access networks. |
---|---|
S2 | the analysis of port, vulnerability, and other scan data to understand the security risks and threats to an organisation, and explain them to management. |
S3 | the evaluation of offensive and defensive techniques that can be used in a security assessment. |
The student can demonstrate
G1 | the methodologies used by hackers and how to inform others of this. |
---|
- Security strategies - vulnerabilities, policies and countermeasures, security processes
- Digital threats, forms of attack, categories and types of adversaries, security needs (privacy, anonymity, integrity, audit), human and physical factors
- Common testing methodologies and standards
- Identification of targets
- Teaching will be based on a hybrid-flexible approach. Instructor-led face-to-face learning is combined with online learning in a flexible course structure that gives students the option of attending sessions in the classroom, participating online, or doing both.
- All activities require active student participation in their own learning.
- Learning delivery methods and available resources will be selected to ensure constructive alignment with course content, learning outcomes and assessment criteria.
- Students will be taught using a mixture of guidance, self-study, and lecture material. Topics will be introduced in a series of weekly lectures. The guidance sessions will be directed practical exercises and reading in which students can explore topics with support from a teacher. This material will also require students to self-manage their time to ensure tasks are completed and the theory is fully understood. This will allow the students to fully engage with lectures and with their peers.
- Learning resources are available in the LMS and include, but is not limited to:
- literature and online reading material (essential and recommended)
- streams, recordings and other digital resources, where applicable
- video conferencing and communication platforms, if applicable
- tools, software and libraries, where applicable
- Students must have access to an internet connection, and suitable hardware.
- Accessing live streams and virtual laboratories requires a minimum broadband connection of 2Mbps (4Mbps recommended).
- Students working on their own laptop/computer are required to acquire appropriate communications software, e.g., webcam, microphone, headphones.
UC2NAP10 Network Architectures and Protocols, or equivalent course(s).
The reading list for this course and any additional electronic resources will be provided in the LMS.
Activity | Duration |
---|---|
Teacher-led activity | 12 |
Teacher-supported work | 24 |
Self-study | 89 |