In this subject students will learn how to test computing systems for vulnerabilities and secure them against hacking. Students will learn how attackers find weaknesses in a computing environment, and be asked to critically evaluate system defences intended to prevent such attacks. Students will become familiar with perimeter and endpoint defences, before learning how to scan and attack networks. Students will also become familiar with the material they need to prepare for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.
School of Computing and Mathematics
Only available to students enrolled in IT Masters relevant courses.
The following table summarises the assessment tasks for the online offering of ITE516 in Session 3 2019. Please note this is a guide only. Assessment tasks are regularly updated and can also differ to suit the mode of study (online or on campus).
The information contained in the CSU Handbook was accurate at the date of publication: October 2020. The University reserves the right to vary the information at any time without notice.