ITC398 Ethical Hacking (8)

This subject introduces students to some key concepts and practices related to ethical hacking. Students will learn how to identify vulnerabilities in information systems and how the vulnerabilities can be exploited by an attacker, with a focus on hacking of wireless networks, web servers, Internet of Things (IoT) and mobile devices. Students will acquire the skills to conduct cyber penetration testing. Hacking countermeasures and legal dimensions of ethical hacking will also be briefly explored.

No offerings have been identified for this subject in 2021.

Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System



One session


School of Computing and Mathematics

Enrolment Restrictions

Available to undergraduate students only.

Assumed Knowledge

ITC106 and ITC292 and ITC358

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to identify vulnerabilities in information systems;
  • be able to analyse reconnaissance and data gathering concepts, such as footprinting, scanning, enumeration and sniffing;
  • be able to compare and execute different techniques used to penetrate a system and escalate privileges;
  • be able to propose effective countermeasures to prevent harm done by malicious hackers; and
  • be able to discuss legal issues associated with ethical hacking.


This subject will cover the following topics:
  • Ethical hacking fundamentals
  • Reconnaissance and data gathering concepts
  • Attacking a system
  • Wireless network hacking
  • Hacking web servers and applications
  • Trojans and other malware
  • Hacking IoT and mobile devices
  • Cyber penetration testing
  • Hacking countermeasures
  • Ethical hacking: Legal aspects

The information contained in the CSU Handbook was accurate at the date of publication: May 2021. The University reserves the right to vary the information at any time without notice.