Pentesting (5 cr)
Code: TI00BI25-3006
General information
- Enrollment
-
14.08.2024 - 08.09.2024
Registration for the implementation has ended.
- Timing
-
26.08.2024 - 15.12.2024
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Contact learning
- Unit
- Department of Information Technology
- Campus
- Kotka Campus
- Teaching languages
- Finnish
- Seats
- 20 - 30
- Degree programmes
- Degree Programme in Cyber Security
- Teachers
- Marko Oras
- Teacher in charge
- Marko Oras
- Groups
-
KTKT22SPCybersecurity, full-time studies
- Course
- TI00BI25
Realization has 14 reservations. Total duration of reservations is 53 h 30 min.
Time | Topic | Location |
---|---|---|
Mon 02.09.2024 time 12:30 - 14:00 (1 h 30 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 09.09.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 16.09.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 23.09.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 30.09.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 14.10.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 28.10.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 04.11.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 11.11.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 18.11.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
|
Mon 25.11.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 02.12.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 09.12.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Mon 16.12.2024 time 10:00 - 14:00 (4 h 0 min) |
Penetraatiotestaus TI00BI25-3006 |
A4011_uusikampus
Blue room (42)
|
Objective
You are able to examine networks from the hacker's point of view.
You are able to gather comprehensive information about the target of the penetration testing and understand the importance of the information acquisition.
You are able to use pentesting tools and different hacking techniques.
You are able to perform the penetration testing to the target.
You are able to report the identified security shortcomings and propose improvements to the security of the target.
Content
What is penetration testing?
Why is it mportant to perform penetration testing?
What is ethical hacking?
Course material
The study materials are compiled on the Learn platform for the study module. These study materials have been gathered from various sources, and there is no requirement for students to purchase or borrow any textbooks for the study module.
Study forms and methods
According to the study schedule learning pathway: You participate in the scheduled teaching and guidance as per the study schedule. Your studies are structured around group meetings and self-paced learning tasks according to the schedule.
Workplace or accelerated learning pathway: The method of completion must be agreed upon before the start of the study module. If you are employed by a company in the field, an organization, or are involved in a project offered by the university, you have the option to complete the study module or module either entirely or partially at your workplace/project. In this case, you will contact the module's teacher at the beginning of the study module and agree on a development task for your workplace/project. Learning requires that you familiarize yourself with the topics covered in the study module and master them both theoretically and practically in your work.
Learning-accelerated pathway: The method of completion must be agreed upon before the start of the study module. In the online implementation, you independently delve into the material available on Learn and complete the necessary learning tasks. Learning tasks include more independent exploration of the topic compared to the schedule-based learning pathway. You can also complete the independent study simultaneously with the scheduled teaching, allowing you to participate in face-to-face teaching as per your interests and needs. However, the learning tasks follow the online implementation.
RDI and work-related cooperation
Possible work assignments from the industry, as well as guest speakers from companies.
Collaboration with projects and staying updated with current industry-oriented podcasts. Potential external guest lecturer. Participation in the HelSec event.
Timing of exams and assignments
Deadlines for the study module's assignments are set according to the schedule of the study module.
Student workload
135 hours, of which approximately 55 hours are for face-to-face instruction.
Evaluation scale
1-5
Assessment methods and criteria
Practical assignments, learning tasks, and active participation in the implementation.
Qualifications
Basics of cybersecurity
Basics of networking
basics of programming
Operating systems
Cybersecurity
Information security