Skip to main content

Pentesting (5 cr)

Code: TI00BI25-3006

General information


Enrollment
14.08.2024 - 08.09.2024
Registration for the implementation has ended.
Timing
26.08.2024 - 15.12.2024
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Contact learning
Unit
Department of Information Technology
Campus
Kotka Campus
Teaching languages
Finnish
Seats
20 - 30
Degree programmes
Degree Programme in Cyber Security
Teachers
Marko Oras
Teacher in charge
Marko Oras
Groups
KTKT22SP
Cybersecurity, full-time studies
Course
TI00BI25

Realization has 14 reservations. Total duration of reservations is 53 h 30 min.

Time Topic Location
Mon 02.09.2024 time 12:30 - 14:00
(1 h 30 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 09.09.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 16.09.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 23.09.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 30.09.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 14.10.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 28.10.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 04.11.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 11.11.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 18.11.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
Mon 25.11.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 02.12.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 09.12.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Mon 16.12.2024 time 10:00 - 14:00
(4 h 0 min)
Penetraatiotestaus TI00BI25-3006
A4011_uusikampus Blue room (42)
Changes to reservations may be possible.

Objective

You are able to examine networks from the hacker's point of view.
You are able to gather comprehensive information about the target of the penetration testing and understand the importance of the information acquisition.
You are able to use pentesting tools and different hacking techniques.
You are able to perform the penetration testing to the target.
You are able to report the identified security shortcomings and propose improvements to the security of the target.

Content

What is penetration testing?
Why is it mportant to perform penetration testing?
What is ethical hacking?

Course material

The study materials are compiled on the Learn platform for the study module. These study materials have been gathered from various sources, and there is no requirement for students to purchase or borrow any textbooks for the study module.

Study forms and methods

According to the study schedule learning pathway: You participate in the scheduled teaching and guidance as per the study schedule. Your studies are structured around group meetings and self-paced learning tasks according to the schedule.

Workplace or accelerated learning pathway: The method of completion must be agreed upon before the start of the study module. If you are employed by a company in the field, an organization, or are involved in a project offered by the university, you have the option to complete the study module or module either entirely or partially at your workplace/project. In this case, you will contact the module's teacher at the beginning of the study module and agree on a development task for your workplace/project. Learning requires that you familiarize yourself with the topics covered in the study module and master them both theoretically and practically in your work.

Learning-accelerated pathway: The method of completion must be agreed upon before the start of the study module. In the online implementation, you independently delve into the material available on Learn and complete the necessary learning tasks. Learning tasks include more independent exploration of the topic compared to the schedule-based learning pathway. You can also complete the independent study simultaneously with the scheduled teaching, allowing you to participate in face-to-face teaching as per your interests and needs. However, the learning tasks follow the online implementation.

RDI and work-related cooperation

Possible work assignments from the industry, as well as guest speakers from companies.
Collaboration with projects and staying updated with current industry-oriented podcasts. Potential external guest lecturer. Participation in the HelSec event.

Timing of exams and assignments

Deadlines for the study module's assignments are set according to the schedule of the study module.

Student workload

135 hours, of which approximately 55 hours are for face-to-face instruction.

Evaluation scale

1-5

Assessment methods and criteria

Practical assignments, learning tasks, and active participation in the implementation.

Qualifications

Basics of cybersecurity
Basics of networking
basics of programming
Operating systems
Cybersecurity
Information security

Go back to top of page