Skip to main content

Attacking cybersecurityLaajuus (5 cr)

Code: KT00FD68

Credits

5 op

Responsible person

  • Kimmo Kääriäinen

Objective

You are able to use the attacker’s point of view.
You are able to analyze information systems to find potential attack surfaces.
You are able to use common tools for information gathering about the target systems.
You are able to apply gathered information and report the findings.

Content

How can the attacker's point of view be utilized?
How can information systems be investigated to find potential vulnerabilities?
What common tools for information gathering exist and how can they be used?
How can gathered information be applied and how are the findings reported?