Penetration Testing 2022-23
School Of Computer Science And Electronic Engineering
Module - Semester 1 & 2
Indicative content includes:
- Purpose of penetration testing.
- Elements of security infrastructure.
- Tools of the trade.
- Ethics and legality of compromising security.
- Documentation and reporting of results.
-threshold -Equivalent to 40%.Uses key areas of theory or knowledge to meet the Learning Outcomes of the module. Is able to formulate an appropriate solution to accurately solve tasks and questions. Can identify individual aspects, but lacks an awareness of links between them and the wider contexts. Outputs can be understood, but lack structure and/or coherence. -good -Equivalent to the range 60%-69%.Is able to analyse a task or problem to decide which aspects of theory and knowledge to apply. Solutions are of a workable quality, demonstrating understanding of underlying principles. Major themes can be linked appropriately but may not be able to extend this to individual aspects. Outputs are readily understood, with an appropriate structure but may lack sophistication. -excellent -Equivalent to the range 70%+.Assemble critically evaluated, relevent areas of knowledge and theory to constuct professional-level solutions to tasks and questions presented. Is able to cross-link themes and aspects to draw considered conclusions. Presents outputs in a cohesive, accurate, and efficient manner.
- Appreciate the professional, legal, and ethical constraints and issues in performing adversarial security testing.
- Communicate results of security testing in a standard form.
- Describe the purpose of, and the methods of conducting, a penetration test.
- Exploit the common tools used for security testing.
Penetration Test Project
PESTLE Constraints Test
Logbook Or Portfolio
Laboratory Exercises: Tools