Show/hide contentOpenClose All
Curricular information is subject to change
On completion of this module students should be able to:
1. Students should have a strong understanding of ethics, the hacker mindset and the motivation of whitehat and black hat hackers.
2. Students should have a strong understanding of the top industry threats.
3. Students should have an understanding of security assessment techniques.
4. Students should be able to demonstrate industry utilised hacking tools.
5. Students should be able to articulate risk appropriately.
6. Students should be able to demonstrate impact of vulnerabilities through POCs.
7. Students should be able to demonstrate industry best practice mitigations.
Introduction to Ethical Hacking
Measuring Risk (Common Vulnerability Scoring System)
Cross Site Scripting (XSS)
Cross Site Request Forgery (CSRF)
|Student Effort Type||Hours|
|Autonomous Student Learning||
Not applicable to this module.
|Description||Timing||Component Scale||% of Final Grade|
|Continuous Assessment: Case Study||Varies over the Trimester||n/a||Graded||No||
|Project: Penetration Testing Report||Coursework (End of Trimester)||n/a||Graded||No||
|Multiple Choice Questionnaire: Multiple Choice Quiz||End of trimester MCQ||n/a||Graded||No||
|Resit In||Terminal Exam|
• Feedback individually to students, post-assessment
Not yet recorded.