Students will learn the general aspects of the ethical hacking and some penetration testing methodologies. Also, through hands-on activities, the students will learn how to use some state-of-the-art tools for the security analysis of systems.
Prerequisites
Basic programming, unix commands
Type of Assessment
Project and oral exam
Course program
The course will cover the basic notions about network devices and protocols. Then, we will go through the main phases of the penetration testing activity: reconnaissance, vulnerability detection, exploitation, post-exploitation and reporting. Most of these phases will be explained though a virtual pentesting laboratory where we will run simulations and exercises.