Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Fully Online
Duration
1 sessions
Details
Program Details
Degree
Masters
Major
Computer Science | Cybersecurity | Network Security
Area of study
Information and Communication Technologies | Security Services
Education type
Fully Online
Course Language
English
About Program

Program Overview


Introduction to ITE516 Hacking Countermeasures

In this subject, students will learn how to test computing systems for vulnerabilities and secure them against hacking. Students will learn how attackers find weaknesses in a computing environment and critically evaluate system defenses intended to prevent such attacks. Students will become familiar with perimeter and endpoint defenses, before learning how to scan and attack networks. Students will also become familiar with the material they need to prepare for the EC-Council Certified Ethical Hacker (CEH) industry certification exam during this subject.


Availability

The subject is available in Session 3, with 90 students, and is offered online and at the Wagga Wagga Campus.


Subject Information

Grading System

The grading system for this subject is HD/FL.


Duration

The duration of this subject is one session.


School

This subject is offered by the School of Computing and Mathematics.


Enrolment Restrictions

This subject is only available to students enrolled in IT Masters relevant courses.


Learning Outcomes

Upon successful completion of this subject, students should:


  • be able to analyse information system weaknesses, and demonstrate how these make an environment vulnerable to attack
  • be able to use reconnaissance tools and techniques to obtain information during this phase of the hacking process
  • be able to compare different techniques used by intruders to penetrate a system and escalate privileges
  • be able to implement countermeasures to prevent attackers causing harm to their target, and from covering their tracks
  • be able to analyse and compare common web application attack techniques, and justify defences that mitigate these attacks

Syllabus

This subject will cover the following topics:


  • Footprinting, scanning and enumeration
  • System hacking and penetration testing
  • Trojans, back doors, viruses and worms
  • Network traffic sniffing
  • Denial of service
  • Social engineering
  • Identifying and exploiting network vulnerabilities
  • Cross-site scripting and SQL injection
  • Physical security
  • Evading IDS, firewalls and honeypots
  • Buffer overflows
  • Cryptography
See More