FI2AMEH75 Ethical Hacking
FI2AMEH75 Ethical Hacking
- Course description
- Course CodeFI2AMEH75
- Level of Study5.2
- Program of StudyNetwork and IT Security
- Credits7.5
- Study Plan CoordinatorBenjamin Rosenlund
This topic will give students an overview of known security tools and their functionality. After this module, the students will have a basic understanding of the techniques used in networks to gather information and acquire unauthorised access to different systems among other things.
The purpose of the topic is to give students an understanding of how different tools have different areas of use, interpret information gathered using network sniffers, vulnerability scanners and other common tools. Through high focus on practical knowledge, the students will be able to secure single computers and networks from threats and external individuals and organizations with illegal intentions.
The candidate:
- has knowledge of concepts, theories, models, processes and tools that are used to gain unauthorised information and access to computer systems.
- can assess their own work in relation to the applicable norms and requirements for penetration testing.
- is familiar with the history, traditions, distinctive nature and place in society of penetration testing and vulnerability scanning.
- has insight into their own opportunities for developing knowledge through experimenting and exploring relevant tools.
The candidate:
- can explain their own vocational choices when exploring information and vulnerabilities in computer systems.
- can reflect on their own vocational practice when using relevant tools and adjust it under supervision.
- can find and refer to information and vocational material and assess its relevance to ethical hacking.
The candidate:
- can plan and carry out vocational tasks and projects alone or as part of a group, and in accordance with ethical requirements and principles regarding penetration testing and network scanning.
- can contribute to organisational development in the use of different security/protection/analysis tools to prevent information leakages.
Digital Learning Resources
The learning management system (LMS) is the primary learning platform where students access most of their course materials. The content is presented in various formats, such as text, images, models, videos or podcasts. Each course follows a progression plan, designed to lead students through weekly modules at their own pace. Exercises and assignments (individual or in groups) are embedded throughout the courses to support continuous practice and assessment of the learning outcomes.
Campus Resources
In addition to the digital learning resources, campus students participate in physical learning activities led by teachers as part of the overall delivery.
Guidance
Guidance and feedback from teachers support students' learning journeys, and may be provided synchronously or asynchronously, individually or in groups, via text, video or in-person feedback.
Eksamensform | Karakterskala | Gruppering | Varighet |
---|---|---|---|
Course Assignment | Grade A-F | Individual | 5 Hour(s) |
Quiz | Grade A-F | Individual | 45 Minute(s) |