CC6051 - Ethical Hacking (2024/25)
Module specification | Module approved to run in 2024/25 | ||||||||||||
Module title | Ethical Hacking | ||||||||||||
Module level | Honours (06) | ||||||||||||
Credit rating for module | 15 | ||||||||||||
School | School of Computing and Digital Media | ||||||||||||
Total study hours | 150 | ||||||||||||
|
|||||||||||||
Assessment components |
|
||||||||||||
Running in 2024/25(Please note that module timeslots are subject to change) |
|
Module summary
This module is designed to develop understanding, knowledge and skills associated with the various malicious hacking attacks targeting computer systems and the appropriate safeguards needed to minimise such attacks.
The module aims are to:
1.Provide students with knowledge and understanding of the various hacking methods used in attacking computer systems and networks.
2.Enable students to use appropriate tools and techniques to identify, analyse, evaluate and test computer security vulnerabilities prone to hacking attacks, and develop appropriate procedures, solutions and countermeasures to defend and minimise such attacks.
3.To develop students’ awareness of ethical, professional, and legal issues connected with hacking.
4.Develop students’ knowledge, transferable skills and confidence in the subject leading to further academic and professional progression in this area.
Prior learning requirements
Successful completion of level 5 CC5009 or CT5008
Syllabus
•Reconnaissance and Intelligence Gathering: Traditional and Current Hacking Methods. (LO1)
•Current Approaches to Hacking. (LO1, LO2, LO4)
•Software Tools and Practical Hacking Methods and Techniques. (LO2)
•Protocols, Network Communication, Internet & Web Based Hacking Attacks. (LO2,LO4)
•Blended Hacking Threats and Exploitations.
•Cloud Insecurity: Hacking the Cloud.
•Hacking Mobile Devices. (LO3)
•Phishing Ecosystem& Hacking. (LO1)
•Social Engineering Hacking Techniques: Influencing and Manipulating Victims. (LO1)
•Integrated Hacking Attacks Based on Complex Approaches, Processes & Systems. (LO4)
•Hacking: Ethical, Professional, Social and Legal Issues. (LO5)
Balance of independent study and scheduled teaching activity
Students will develop theoretical understanding and practical skills in the subject area based on weekly lectures, tutorials and supervised workshops. The tutorials and workshops, in particular, are provided to support students in gaining practical experience in tackling a wide range of computer hacking related issues and problems.
Appropriate blended learning approaches and technologies, such as, the University’s VLE and online tools, will be used to facilitate and support student learning, in particular, to:
•deliver content.
•encourage active learning.
•provide formative and summative assessments, and prompt feedback.
•enhance student engagement and learning experience.
Students will be expected and encouraged to produce reflective commentaries and an action plan for personal development on the learning activities and tasks that they carry out to complete their work, e.g. in the form of an assessed section of their coursework report/essay.
Learning outcomes
On completing the module, the student will be able to:
- LO1: Demonstrate an understanding of the various types of hacking methods, techniques, tactics approaches and strategies that undermine the integrity, availability and confidentiality of computer systems and networks.
- LO2: Use appropriate tools, techniques, and methods to identify, detect, analyse, evaluate, test and document the various types of hacking attacks on computer system and networks.
- LO3: Develop and implement practical solutions and countermeasures to thwart and reduce the various threats posed by hacking attacks on computer system and networks.
- LO4: Apply ethical hacking guiding principles in undertaking the various leaning activities and tasks.
- LO5: Critically reflect and evaluate the activities within the topic area in the context of Legal, Social, Ethical and Professional (LSEP) issues.