Universidad de Jaén

Menú local

Syllabus 2018-19 - 77212008 - Ethical Hacking (Hacking ético)

Caption
  • Level 1: Tutorial support sessions, materials and exams in this language
  • Level 2: Tutorial support sessions, materials, exams and seminars in this language
  • Level 3: Tutorial support sessions, materials, exams, seminars and regular lectures in this language
DEGREE: Máster Univ. en Seguridad informática (77212008)
FACULTY: Centre for Postgraduate Studies of the University of Jaen

DEGREE: Doble Máster en Ingeniería informática y Seguridad informática (77612008)
FACULTY: SCHOOL OF ENGINEERING OF JAÉN

DEGREE: Máster en Ingeniería informática (74013007)
FACULTY: SCHOOL OF ENGINEERING OF JAÉN

ACADEMIC YEAR: 2018-19
SYLLABUS
1. COURSE BASIC INFORMATION
NAME: Ethical Hacking
CODE: 77212008 (*) ACADEMIC YEAR: 2018-19
LANGUAGE: English LEVEL: 1
ECTS CREDITS: 4.0 YEAR: 1 SEMESTER: PC
 
2. LECTURER BASIC INFORMATION
NAME: GARCÍA CUMBRERAS, MIGUEL ÁNGEL
DEPARTMENT: U118 - INFORMÁTICA
FIELD OF STUDY: 570 - LENGUAJES Y SISTEMAS INFORMÁTICOS
OFFICE NO.: A3 - 112 E-MAIL: magc@ujaen.es P: 953212420
WEBSITE: http://blogs.ujaen.es/magc/
LANGUAGE: - LEVEL: 1
 
3. CONTENT DESCRIPTION

  1. Introduction
    Ethical Hacking and Essential Terminology
    Security elements
    Hacker Phases
    Types of hackers
    Types of Safety Test
  2. Obtaining information
    Pre-attack: Footprinting and scanning
    Methodology for obtaining information
    Google hacking
    Whois
    Nslookup
    Traceroute
    Thread Tools
  3. Scanning
    Ping
    Ping sweeps
    Port scanning techniques
    Types of scans
    Nmap and other tools
  4. Vulnerabilities
    What is enumeration?
    Null sessions and countermeasures
    Nessus
    Active directory
  5. System Hacking
    Entry into systems: tests, dictionary
    Password sniffing
    Types of password attacks
    Crack of passwords
    Keyloggers
    Escalation of privileges
    DoS Attacks
    Erasing of footprints
    Anonymous navigation
  6. Web Attacks
  7. Metasploit
  8. Exploitation

4. COURSE DESCRIPTION AND TEACHING METHODOLOGY

Theory: exposition of theoretical concepts. 

Practices: practical implementation of the techniques studied in theory classes. Delivery of internships at established dates.

Students with special educational needs should contact the Student Attention Service (Servicio de Atención y Ayudas al Estudiante) in order to receive the appropriate academic support

5. ASSESSMENT METHODOLOGY

- Theory (30%). Exam of the theoretical contents.

- Practices (50%): Evaluation of the practices.

- Assistance in face-to-face activities (10%).

- Participation in face-to-face activities (10%). Active participation in face-to-face activities

6. BOOKLIST
MAIN BOOKLIST:
  • Hacking Etico 101 : cómo hackear profesionalmente en 21 días o menos! : comprendiendo la mente del h. Edition: [2ª ed.] (actualizada a Kali 2.0). Author: Astudillo, Karina B. Publisher: [United States ] : CreateSpace, [2016]  (Library)
  • Seguridad informática : hacking Ético : conocer el ataque para una mejor defensa. Edition: 3ª ed. Author: -. Publisher: Cornellá de Llobregat : ENI, 2015  (Library)
ADDITIONAL BOOKLIST:
  • Hacking web technologies. Edition: -. Author: -. Publisher: Madrid : ZeroXword computing, 2016  (Library)
  • SQL Injection. Edition: [3ª ed. rev. y amp.]. Author: Rando González, Enrique. Publisher: Madrid : OxWord, 2016  (Library)
  • Hacking y forensic : desarrolle sus propias herramientas en Python. Edition: -. Author: Ebel, Franck. Publisher: Cornellá de Llobregat : Eni, 2016  (Library)
  • Hacking and penetration testing with low power devices [Recurso electrónico]. Edition: 1st ed. Author: Polstra, Philip. Publisher: Waltham, MA : Syngress, c2015  (Library)
  • Hacking with Kali [Recurso electrónico] : practical penetration testing techniques. Edition: 1st ed. Author: Broad, James. Publisher: Waltham, MA : Syngress, 2014  (Library)