FI2AMEH75 Ethical Hacking

FI2AMEH75 Ethical Hacking

  • Course description
    • Course code
      FI2AMEH75
    • Level of study
      5.2
    • Program of study
      Network and IT Security
    • Credits
      7.5
    • Course coordinator
      Justine Moodley, Benjamin Rosenlund
Teaching term(s)
2025 Spring
Authors
benjamin.rosenlund@noroff.no
About the Course

This topic will give students an overview of known security tools and their functionality. After this module, the students will have a basic understanding of the techniques used in networks to gather information and acquire unauthorised access to different systems among other things. 

The purpose of the topic is to give students an understanding of how different tools have different areas of use, interpret information gathered using network sniffers, vulnerability scanners and other common tools. Through high focus on practical knowledge, the students will be able to secure single computers and networks from threats and external individuals and organizations with illegal intentions. 

Course Learning Outcomes
Learning outcomes - Knowledge

The candidate: 

  • has knowledge of concepts, theories, models, processes and tools that are used to gain unauthorised information and access to computer systems. 
  • can assess their own work in relation to the applicable norms and requirements for penetration testing. 
  • is familiar with the history, traditions, distinctive nature and place in society of penetration testing and vulnerability scanning. 
  • has insight into their own opportunities for developing knowledge through experimenting and exploring relevant tools. 
Learning outcomes - Skills

The candidate: 

  • can explain their own vocational choices when exploring information and vulnerabilities in computer systems. 
  • can reflect on their own vocational practice when using relevant tools and adjust it under supervision. 
  • can find and refer to information and vocational material and assess its relevance to ethical hacking. 
General Competence

The candidate: 

  • can plan and carry out vocational tasks and projects alone or as part of a group, and in accordance with ethical requirements and principles regarding penetration testing and network scanning. 
  • can contribute to organisational development in the use of different security/protection/analysis tools to prevent information leakages. 
Teaching and Learning

In this course, the following teaching and learning methods can be applied, but are not limited to:

  • Lecture: Educator-led presentations or activities providing knowledge, skills, or general competencies in the subject area.
  • Group work: Collaborative activities where students work together to solve problems or complete tasks.
  • Tutoring: One-on-one or small group sessions with an instructor for personalized guidance and support.
  • Student presentations: Opportunities for students to demonstrate their understanding of course material by presenting to peers.
  • Online lessons: Digital content delivered via an online learning platform.
  • Guidance: Individualized advice and direction from instructors to support students in their learning journey.
  • Workshops: Practical sessions focused on hands-on application of theoretical concepts or skills.
  • Self-study: Independent study where students engage with course material on their own without any teacher support.
Reading list

Teaching materials, reading lists, and essential resources will be shared in the learning platform and software user manuals where applicable.

Assessments
EksamensformKarakterskalaGrupperingVarighet
Course Assignment
Grade A-F
Individual
5 Hour(s)
Test
Grade A-F
Individual
45 Minute(s)