Hide menu

Ethical Hacking

2025HT

Status Active - open for registrations
School IDA-gemensam (IDA)
Division RTSLAB
Owner Mikael Asplund
Homepage TBD

  Log in  




Course plan

No of lectures

5

Recommended for

PhD students interested in learning about software and systems security, including practical vulnerability assessment and mitigation as well as ethical concerns.

The course was last given

New course

Goals

- Explain laws, regulations and policies related to ethical hacking.
- Reflect orally and in writing on the ethics of work and studies related to cyber security.
- Perform reconnaissance and identification of systems, protocols, software, vulnerabilities and possible attack vectors.
- Adapt and analyze existing exploits, and use these to attack isolated test systems in multiple stages.
- Identify and evaluate possible vulnerabilities in small-scale networks.
- Propose, implement and evaluate mitigations to protect systems attacked by others.

Prerequisites

- Basic knowledge of system administration (e.g. Linux)
- Basic networking
- Basic security
- Basic programming

Organization

Theory on methods of penetration testing and other relevant techniques are presented in lectures. Ethical hacking capabilities are developed through self studies in pairs. The practical parts of the course are evaluated by capturing flags and implementing new functionality in an isolated network environment, in addition to written reflections and assessments. Ethical positions are discussed in seminars.

Content

Basic rules and ethics
Reconnaissance, information sources and tools
Penetration testing (according to Mitre)
Red/blue team practice
Vulnerability identification and assessment
Mitigation design and implementation

Literature

Online resources

Lectures

1. Course introduction
2. Laws and regulation
3. Ethics
4. Penetration testing theory, frameworks and techniques
5. Mitigation techniques

Examination

- Ethics essay and seminar 1hp
- Capture-the-flag exercises and writeups 3hp
- Assignment based on threat assessment and mitigation 2hp

Examiner

Mikael Asplund, course leader: Charilaos Skandylas

Credits

6

Comments

The course is based on a master-level course (TDDE61), but is expanded with an a more in-depth ethical essay and the assignment on threat assessment and mitigation.


Page responsible: Anne Moe