Logo ČVUT
CZECH TECHNICAL UNIVERSITY IN PRAGUE
STUDY PLANS
2024/2025

Ethical Hacking

The course is not on the list Without time-table
Code Completion Credits Range Language
BI-EHA.21 Z,ZK 5 2P+2C Czech
Garant předmětu:
Lecturer:
Tutor:
Supervisor:
Department of Information Security
Synopsis:

The goal of the course is to introduce students to the field of penetration testing and ethical hacking. The course deals with cybersecurity threats, vulnerabilities, and their possible exploitation in computer networks, web applications, wireless networks, operating systems, and others like the Internet of Things or cloud. The focus is on hands-on experience with vulnerabilities testing and the following process of penetration test documentation.

Requirements:

Entry knowledge: OS Linux, web applications, database systems (SQL), basics of computer networks, and cryptography. It is an advantage to have the following courses completed or take them together with BI-EHA: BI-UOS, BI-DBS, BI-KAB, BI-PSI and BI-TWA.1

Syllabus of lectures:

1. Introduction to penetration testing area.

2. Network traffic analysis and services discovery.

3. Vulnerability of network infrastructure.

4. Web applications - authentication and session management.

5. Web applications - code injection.

6. Web applications - scripting and request forgery.

7. Attacks on security of Wi-Fi systems.

8. Authentication and passwords

9. Reporting.

10. Operating systems, privileges escalation.

11. Embedded systems, attack vectors.

12. Automotive security.

13. Typical attacks on cloud systems.

Syllabus of tutorials:

1. Introduction

2. Traffic Analysis

3. Web Security I

4. Web Security II

5. Web Security III

6. Password Cracking - Offline

7. Password Cracking - Online

8. Operating System Security

9. Wi-Fi

10. Forensics

11. Real World Vulnerabilities

12. Cloud Security

13. Reserve

Study Objective:

The goal of the course is to introduce students to the field of penetration testing and ethical hacking.

Study materials:

1. Kennedy D., O'gorman D., Kearns D. : Metasploit: The Penetration Tester's Guide. No Starch Press, 2011. ISBN 978-1593272883.

2. Weidman G. : Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press, 2014. ISBN 978-1593275648.

3. Messier R. : Learning Kali Linux: Security Testing, Penetration Testing & Ethical Hacking. O0Reilly, 2018. ISBN 978-1492028697.

4. Messier R. : CEH v10 Certified Ethical Hacker Study Guide. Sybex, 2019. ISBN 978-1119533191.

Note:
Further information:
https://courses.fit.cvut.cz/BI-EHA/
No time-table has been prepared for this course
The course is a part of the following study plans:
Data valid to 2024-04-26
Aktualizace výše uvedených informací naleznete na adrese https://bilakniha.cvut.cz/en/predmet6702706.html