Course Title: Ethical Hacking and Security Testing

Part A: Course Overview

Course Title: Ethical Hacking and Security Testing

Credit Points: 12.00

Important Information:

 

 


Terms

Course Code

Campus

Career

School

Learning Mode

Teaching Period(s)

INTE2580

City Campus

Postgraduate

175H Computing Technologies

Face-to-Face

Sem 2 2022,
Sem 2 2023,
Sem 2 2024

INTE2604

RMIT University Vietnam

Postgraduate

175H Computing Technologies

Face-to-Face

Viet2 2023

Course Coordinator: Maggie Liu

Course Coordinator Phone: -

Course Coordinator Email: xiaoning.liu@rmit.edu.au

Course Coordinator Location: City Campus

Course Coordinator Availability: By appointment, by email


Pre-requisite Courses and Assumed Knowledge and Capabilities

Enforced Pre-requisite courses

Successful completion of:

COSC2737 - IT Infrastructure and Security (Course ID 052703)

Note: it is a condition of enrolment at RMIT that you accept responsibility for ensuring that you have completed the prerequisite/s and agree to concurrently enrol in co-requisite courses before enrolling in a course.

For your information go to RMIT Course Requisites webpage.

 

If you have completed prior studies at RMIT or another institution that developed the skills and knowledge covered in the above course/s you may be eligible to apply for credit transfer.

Alternatively, if you have prior relevant work experience that developed the skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.

Please follow the link for further information on how to apply for credit for prior study or experience.


Course Description

The main objective of this course is for students to acquire the tools and techniques necessary to perform practical security testing in various areas. Students are provided with a range of practical exercises and tasks to reinforce their skills including: monitor the Internet traffic, testing of secure applications, identification of vulnerabilities in networked and mobile/wireless applications. In addition, students will learn input validation techniques to minimise security risks, man-in-the-middle attack techniques to be able to build more secure networked applications, practical secure software testing techniques to be able to test applications for security bugs.


Objectives/Learning Outcomes/Capability Development

Program Learning Outcomes

This course is an option course so it is not required to contribute to the development of program learning outcomes (PLOs) though it may assist your achievement of several PLOs.

For more information on the program learning outcomes for your program, please see the program guide.


On successful completion of this course you should be able to:

  1. Investigate methods that are appropriate for the realisation security testing in software, web, network and systems;
  2. Investigate and model the possible vulnerabilities and threats for a given application system;
  3. Design, implement test procedures and perform post-testing evaluation;
  4. Research, analyse and evaluate security related scenarios


Overview of Learning Activities

The learning activities included in this course are one hour lectorial plus two hour Labtute each week over 12 weeks:

  • Key concepts are given on Canvas; Lectorial enables Q&A and further discussions; tools and software used will be demonstrated in the Labtute;
  • Labs focused on practice which allow exploration of security loopholes, and give feedback on your progress and understanding;
  • Assignments, as described in Overview of Assessment (below), requiring an integrated understanding of the subject matter; and private study, working through the course as presented in classes and learning materials, and gaining practice at solving conceptual and technical problems.


Overview of Learning Resources

You will make extensive use of computer laboratories and relevant software provided by the School. You will be able to access course information and learning materials through Canvas. Lists of relevant reference texts, resources in the library and freely accessible Internet sites will be provided.

Use the RMIT Bookshop’s textbook list search page to find any recommended textbook(s).


Overview of Assessment

This course has no hurdle requirements.


Assessment Tasks

Assessment Task 1: Assignment 1
Weighting 30%
This assessment task supports CLOs 1, 2 & 3

Assessment Task 2: Assignment 2 
Weighting 40%
This assessment task supports CLOs 1, 3 & 4

Assessment Task 3: Assignment 3
Weighting 30%
This assessment task supports CLOs 2, 3 & 4

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.