ITE516 Hacking Countermeasures (8)


In this subject students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.

+ Subject Availability Modes and Location

Session 3
DistanceWagga Wagga Campus
Continuing students should consult the SAL for current offering details: ITE516
Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject information

Duration Grading System School:
One sessionHD/FLSchool of Computing and Mathematics

Enrolment restrictions

Only available to students enrolled in: Master of Information Systems Security
Master of Networking and Systems Administration
Master of Management (Information Technology)

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to plan, design and manage a security review;
  • be able to critically analyse the difference between shell and terminal access and describe the advantages of each;
  • be able to investigate the key points of vulnerability scanning and analyse the results;
  • be able to describe the concepts of reconnaissance and understand how to obtain information during this phase;
  • be able to distinguish between the legal issues that surround penetration testing;
  • be able to demonstrate advanced techniques for breaking and exploiting password flaws.


The subject will cover the following topics:
  • Footprinting, Scanning and Enumeration.
  • Penetration Testing, System Hacking, Session Hacking and Linux Hacking.
  • Trojans, Back Doors, Viruses and Worms.
  • Sniffers.
  • Denial of Service.
  • Social Engineering.
  • Hacking networks and exploiting vulnerabilities.
  • SQL Injections.
  • Physical Security.
  • Evading IDS, Firewalls and Honeypots.
  • Buffer Overflows.
  • Cryptography.


The information contained in the 2016 CSU Handbook was accurate at the date of publication: 06 September 2016. The University reserves the right to vary the information at any time without notice.