ITE516 Hacking Countermeasures (8)

In this subject students will learn how to test computing systems for vulnerabilities and secure them against hacking. Students will learn how attackers find weaknesses in a computing environment, and be asked to critically evaluate system defences intended to prevent such attacks. Students will become familiar with perimeter and endpoint defences, before learning how to scan and attack networks. Students will also become familiar with the material they need to prepare for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.

Availability

Session 3 (90)
Online
Wagga Wagga Campus

Continuing students should consult the SAL for current offering details: ITE516. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System

HD/FL

Duration

One session

School

School of Computing and Mathematics

Enrolment Restrictions

Only available to students enrolled in IT Masters relevant courses.

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to analyse information system weaknesses, and demonstrate how these make an environment vulnerable to attack;
  • be able to use reconnaissance tools and techniques to obtain information during this phase of the hacking process;
  • be able to compare different techniques used by intruders to penetrate a system and escalate privileges;
  • be able to implement countermeasures to prevent attackers causing harm to their target, and from covering their tracks; and
  • be able to analyse and compare common web application attack techniques, and justify defences that mitigate these attacks.

Syllabus

This subject will cover the following topics:
  • Footprinting, scanning and enumeration
  • System hacking and penetration testing
  • Trojans, back doors, viruses and worms
  • Network traffic sniffing
  • Denial of service
  • Social engineering
  • Identifying and exploiting network vulnerabilities
  • Cross-site scripting and SQL injection
  • Physical security
  • Evading IDS, firewalls and honeypots
  • Buffer overflows
  • Cryptography

Indicative Assessment

The following table summarises the assessment tasks for the online offering of ITE516 in Session 3 2019. Please note this is a guide only. Assessment tasks are regularly updated and can also differ to suit the mode of study (online or on campus).

Item Number
Title
Value %
1
Lab practical task (part 1) - password fetcher
10
2
Lab practical task (part 2) - password analysis
15
3
Social engineering essay
30
4
Final exam
45

The information contained in the CSU Handbook was accurate at the date of publication: July 2020. The University reserves the right to vary the information at any time without notice.

Back