ITE516 Hacking Countermeasures (8)

In this subject students will learn how to scan, test, hack and secure computing systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work before learning to scan and attack networks. Students will be prepared for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.

Subject Outlines
Current CSU students can view Subject Outlines for recent sessions. Please note that Subject Outlines and assessment tasks are updated each session.


Session 3 (90)
Wagga Wagga Campus
Term 2 (15)
Wagga Wagga Campus

Continuing students should consult the SAL for current offering details: ITE516. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System



One session


School of Computing and Mathematics

Enrolment Restrictions

Only available to students enrolled in IT Masters relevant courses.

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to plan, design and manage a security review;
  • be able to critically analyse the difference between shell and terminal access and describe the advantages of each;
  • be able to investigate the key points of vulnerability scanning and analyse the results;
  • be able to describe the concepts of reconnaissance and understand how to obtain information during this phase;
  • be able to distinguish between the legal issues that surround penetration testing;
  • be able to demonstrate advanced techniques for breaking and exploiting password flaws.


This subject will cover the following topics:
  • Footprinting, Scanning and Enumeration.
  • Penetration Testing, System Hacking, Session Hacking and Linux Hacking.
  • Trojans, Back Doors, Viruses and Worms.
  • Sniffers.
  • Denial of Service.
  • Social Engineering.
  • Hacking networks and exploiting vulnerabilities.
  • SQL Injections.
  • Physical Security.
  • Evading IDS, Firewalls and Honeypots.
  • Buffer Overflows.
  • Cryptography.


Current Students

For any enquiries about subject selection or course structure please contact Student Central or or phone on 1800 275 278.

Prospective Students

For further information about Charles Sturt University, or this course offering, please contact info.csu on 1800 275 278 (free call within Australia) or enquire online.

The information contained in the 2018 CSU Handbook was accurate at the date of publication: August 2018. The University reserves the right to vary the information at any time without notice.