Accessibility statement

Ethical Hacking, Analysis & Investigation - COM00182M

« Back to module search

  • Department: Computer Science
  • Module co-ordinator: Dr. Roberto Metere
  • Credit value: 20 credits
  • Credit level: M
  • Academic year of delivery: 2024-25
    • See module specification for other years: 2023-24

Related modules

Co-requisite modules

  • None

Prohibited combinations

  • None

Additional information

For pre-requisite module notes: CTAP prior to 2023/24 was COM00093M. Students must have taken one of CTAP-H or CTAP-M. NETS prior to 2023/4 was COM00045H or COM00171M, Students must have also taken one of NETS-H or NETS-M.

 

Module will run

Occurrence Teaching period
A Semester 2 2024-25

Module aims

The module aims to provide an introductory range of theoretical and practical skills to undertake ethical hacking, analysis, and investigation of modern computer systems and networks.

The module will explore ethical hacking topics such as vulnerability exploitation of cryptographic and network protocols, reverse engineering, and other penetration testing techniques, as well as malware analysis and digital investigation of cyber incidents.

The module will familiarise students with a range of tools used by ethical hackers and security practitioners.

Module learning outcomes

By the end of the module the students will be able to:

  1. Explain the fundamental concepts of cyber security in systems and networks

  2. Analyse security strengths & weaknesses in network mechanisms

  3. Analyse major threats and attacks in systems and networks under various scenarios, architectures, and threat models

  4. Synthesise control solutions for network security

  5. Assess the relative merits of different solution approaches in various security-related contexts

Assessment

Task Length % of module mark
Closed/in-person Exam (Centrally scheduled)
Closed exam : Group closed assessment (Capture the Flag)
3 hours 30
Essay/coursework
Essay : Individual Open Assessment
N/A 70

Special assessment rules

None

Reassessment

Task Length % of module mark
Essay/coursework
Essay : Group Reflection Reassessment
N/A 30
Essay/coursework
Essay : Individual Open Assessment - Reassessment
N/A 70

Module feedback

Feedback is provided throughout the sessions, and after the assessment as per normal University guidelines.

Indicative reading

  • Jon Erickson. Hacking: The Art of Exploitation. No Starch (2008)

  • Sikorski, Michael ; Honig, Andrew. Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software. No Starch Press, Incorporated (2012)

  • Maurushat, Alana. Ethical hacking. University of Ottawa Press (2019)



The information on this page is indicative of the module that is currently on offer. The University is constantly exploring ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary by the University. Where appropriate, the University will notify and consult with affected students in advance about any changes that are required in line with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.