Syllabuses - PG

CS807 - Vulnerability Assessment and Security Testing

TIMETABLETEACHING MATERIAL
Credits15
Level5
SemesterTerm 3
Availability
Prerequisites
Learning Activities Breakdown
Items of Assessment2
Assessment100% Coursework:

Coursework 1 (50%): This is a hands-on assessment, where students will engage with vulnerable machines, honing their skills in identifying and exploiting vulnerabilities. This assessment is designed as a Capture the Flag (CTF) challenge, providing a simulated environment where students must employ their problem-solving abilities and technical acumen to succeed. Students will need to document their entire process in a detailed report. This report serves as a crucial component of the evaluation, requiring students to articulate their methodology, the attack vectors they explored, and the techniques they employed to exploit vulnerabilities successfully. 

Coursework 2 (50%): Report exploring theoretical knowledge and understanding of concepts. 

LecturerJide Edu

Aims and Objectives

The aim of this class is to provide in depth coverage of vulnerability assessment and security testing by taking a "blue team" perspective, and going beyond penetration testing by placing particular emphasis on code security testing and code security reviews.

Learning Outcomes

At the end of this module students should be able: 

  1. To have a deep understanding of theoretical knowledge about vulnerability types, security testing methodologies, and risk assessment.
  2. To conduct vulnerability assessments using industry-standard tools and methodologies.
  3. To conduct penetration tests on systems and applications to identify security weaknesses.
  4. To understand the legal and ethical issues in security testing.
  5. To evaluate the risk associated with identified vulnerabilities and propose and implement strategies for mitigating security risks.

Syllabus

  • Application Vulnerabilities and Exploitation
  • Router Vulnerabilities and Wireless Security Testing
  • Exploit Development with PWNTools
  • Malware Analysis
  • Web and Email Security
  • Static and Binary Analysis with Debugger
  • Azure Cloud Application Security
  • Professional Reporting of Security Testing Findings

Recommended Reading

This list is indicative only – the class lecturer may recommend alternative reading material. Please do not purchase any of the reading material listed below until you have confirmed with the class lecturer that it will be used for this class.

  1. Practical Web Penetration Testing. by Gus Khawaja. Released June 2018. Publisher(s): Packt Publishing. ISBN: 9781788624039
  2. Network Security Assessment: Know Your Network Paperback - 2017 - 3rd Edition; Publisher O'Reilly Media; Date 2017-01-17; ISBN 9781491910955
  3. Metasploit, 2nd Edition. by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, and Daniel Graham. October 2024, 352 pp. ISBN-13: 9781718502987
  4. The Hacker Playbook 3: Practical Guide to Penetration Testing by Kim, Peter - ISBN 10: 1980901759 - ISBN 13: 9781980901754 - Independently published - 2018.

Last updated: 2024-08-12 07:33:29