The system will be offline between 13:00 and 14:00 17 October 2024 for scheduled maintenance.
Last modified: 23 Jul 2024 10:44
This course will deliver approaches and methodologies used for carrying out and managing security and penetration testing, including but not limited to web applications, network protocols, common attacks and security countermeasures. The course will help the student build the ability to design secure systems and defend against intrusion.
Study Type | Postgraduate | Level | 5 |
---|---|---|---|
Term | Second Term | Credit Points | 15 credits (7.5 ECTS credits) |
Campus | Aberdeen | Sustained Study | No |
Co-ordinators |
|
In this course, you will build your penetration skills by applying the different technologies in security testing. You will also gain the experience of using different kinds of security tools in exploiting and defending the security of a system.
Information on contact teaching time is available from the course guide.
Assessment Type | Summative | Weighting | 60 | |
---|---|---|---|---|
Assessment Weeks | 32 | Feedback Weeks | 32 | |
Feedback |
2-hour Exam (on campus) |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Conceptual | Understand | Understand the legal aspect of penetration testing. |
Procedural | Analyse | Analyse the security of a system |
Procedural | Apply | Apply security countermeasures to vulnerable systems |
Procedural | Apply | Understand and apply different kind of attacks |
Assessment Type | Summative | Weighting | 40 | |
---|---|---|---|---|
Assessment Weeks | 32 | Feedback Weeks | ||
Feedback |
2 x Computer Programming Exercise (20% each) |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Analyse | Analyse the security of a system |
Procedural | Apply | Apply security countermeasures to vulnerable systems |
Procedural | Apply | Understand and apply different kind of attacks |
There are no assessments for this course.
Assessment Type | Summative | Weighting | 100 | |
---|---|---|---|---|
Assessment Weeks | Feedback Weeks | |||
Feedback |
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
|
Knowledge Level | Thinking Skill | Outcome |
---|---|---|
Procedural | Apply | Apply security countermeasures to vulnerable systems |
Conceptual | Understand | Understand the legal aspect of penetration testing. |
Procedural | Analyse | Analyse the security of a system |
Procedural | Apply | Understand and apply different kind of attacks |
We have detected that you are have compatibility mode enabled or are using an old version of Internet Explorer. You either need to switch off compatibility mode for this site or upgrade your browser.