Learning Outcomes:
On completion of this module students should be able to:
1. Students should have a strong understanding of ethics, the hacker mindset and the motivation of whitehat and black hat hackers.
2. Students should have a strong understanding of the top industry threats.
3. Students should have an understanding of security assessment techniques.
4. Students should be able to demonstrate industry utilised hacking tools.
5. Students should be able to articulate risk appropriately.
6. Students should be able to demonstrate impact of vulnerabilities through POCs.
7. Students should be able to demonstrate industry best practice mitigations.
Indicative Module Content:
Introduction to Ethical Hacking
Industry Threats
Measuring Risk (Common Vulnerability Scoring System)
SQL Injection
Cross Site Scripting (XSS)
Cross Site Request Forgery (CSRF)
Broken Authentication
Broken Authorisation
Bad Cryptography
Current Trends