Accessibility statement

Ethical Hacking, Analysis & Investigation - COM00182M

« Back to module search

  • Department: Computer Science
  • Credit value: 20 credits
  • Credit level: M
  • Academic year of delivery: 2024-25
    • See module specification for other years: 2023-24

Related modules

Co-requisite modules

  • None

Prohibited combinations

  • None

Additional information

For pre-requisite module notes: CTAP prior to 2023/24 was COM00093M. Students must have taken one of CTAP-H or CTAP-M. NETS prior to 2023/4 was COM00045H or COM00171M, Students must have also taken one of NETS-H or NETS-M.

 

Module will run

Occurrence Teaching period
A Semester 2 2024-25

Module aims

The module aims to provide an introductory range of theoretical and practical skills to undertake ethical hacking, analysis, and investigation of modern computer systems and networks.

The module will explore ethical hacking topics such as vulnerability exploitation of cryptographic and network protocols, reverse engineering, and other penetration testing techniques, as well as malware analysis and digital investigation of cyber incidents.

The module will familiarise students with a range of tools used by ethical hackers and security practitioners.

Module learning outcomes

By the end of the module the students will be able to:

  1. Explain the fundamental concepts of cyber security in systems and networks

  2. Analyse security strengths & weaknesses in network mechanisms

  3. Analyse major threats and attacks in systems and networks under various scenarios, architectures, and threat models

  4. Synthesise control solutions for network security

  5. Assess the relative merits of different solution approaches in various security-related contexts

Indicative assessment

Task % of module mark
Closed/in-person Exam (Centrally scheduled) 100

Special assessment rules

None

Indicative reassessment

Task % of module mark
Closed/in-person Exam (Centrally scheduled) 100

Module feedback

Feedback is provided throughout the sessions, and after the assessment as per normal University guidelines.

Indicative reading

  • Jon Erickson. Hacking: The Art of Exploitation. No Starch (2008)

  • Sikorski, Michael ; Honig, Andrew. Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software. No Starch Press, Incorporated (2012)

  • Maurushat, Alana. Ethical hacking. University of Ottawa Press (2019)



The information on this page is indicative of the module that is currently on offer. The University constantly explores ways to enhance and improve its degree programmes and therefore reserves the right to make variations to the content and method of delivery of modules, and to discontinue modules, if such action is reasonably considered to be necessary. In some instances it may be appropriate for the University to notify and consult with affected students about module changes in accordance with the University's policy on the Approval of Modifications to Existing Taught Programmes of Study.