Menú local
Syllabus 2019-20 - 77212008 - Ethical Hacking (Hacking ético)
- Level 1: Tutorial support sessions, materials and exams in this language
- Level 2: Tutorial support sessions, materials, exams and seminars in this language
- Level 3: Tutorial support sessions, materials, exams, seminars and regular lectures in this language
DEGREE: | Máster Univ. en Seguridad informática (77212008) |
FACULTY: | SCHOOL OF ENGINEERING OF JAÉN |
DEGREE: | Máster en Ingeniería informática (74013007) |
FACULTY: | SCHOOL OF ENGINEERING OF JAÉN |
DEGREE: | Doble Máster en Ingeniería informática y Seguridad informática (77612008) |
FACULTY: | SCHOOL OF ENGINEERING OF JAÉN |
ACADEMIC YEAR: | 2019-20 |
COURSE: | Ethical Hacking |
NAME: Ethical Hacking | |||||
CODE: 77212008 (*) | ACADEMIC YEAR: 2019-20 | ||||
LANGUAGE: English | LEVEL: 1 | ||||
ECTS CREDITS: 4.0 | YEAR: 1 | SEMESTER: PC |
NAME: GARCÍA CUMBRERAS, MIGUEL ÁNGEL | ||
DEPARTMENT: U118 - INFORMÁTICA | ||
FIELD OF STUDY: 570 - LENGUAJES Y SISTEMAS INFORMÁTICOS | ||
OFFICE NO.: A3 - 112 | E-MAIL: magc@ujaen.es | P: 953212420 |
WEBSITE: http://blogs.ujaen.es/magc/ | ||
ORCID: https://orcid.org/0000-0003-1867-9587 | ||
LANGUAGE: - | LEVEL: 1 |
- Introduction
Ethical Hacking and Essential Terminology
Security elements
Hacker Phases
Types of hackers
Types of Safety Test - Obtaining information
Pre-attack: Footprinting and scanning
Methodology for obtaining information
Google hacking
Whois
Nslookup
Traceroute
Thread Tools - Scanning
Ping
Ping sweeps
Port scanning techniques
Types of scans
Nmap and other tools - Vulnerabilities
What is enumeration?
Null sessions and countermeasures
Nessus
Active directory - System Hacking
Entry into systems: tests, dictionary
Password sniffing
Types of password attacks
Crack of passwords
Keyloggers
Escalation of privileges
DoS Attacks
Erasing of footprints
Anonymous navigation - Web Attacks
- Metasploit
- Exploitation
Theory: exposition of theoretical concepts.
Practices: practical implementation of the techniques studied in theory classes. Delivery of internships at established dates.
Students with special educational needs should contact the Student Attention Service (Servicio de Atención y Ayudas al Estudiante) in order to receive the appropriate academic support
Attendance and participation (measured by the teacher's follow-up grades) which is 20% of the final grade:
- Parts of signatures of attendance to practices
Participation in the debates
Participation in work on different topics
Theoretical concepts:
Measured by examination conducted through the virtual teaching platform, which accounts for 30% of the final grade (CB6, CB7 and CB10 Competences; Results RB6, RB7, RB7b, RB7c, RB10, RE08MSE and RG1mSEGI).
Practical concepts:
Measured by the delivery of practices during the duration of the
course, which represents 50% of the final grade (Competences
E8MSEGI, CTI3, CTI4 and CB7; Results RE08MSE, RG1mSEGI, RT3 and
RT4).
Those who have not passed the practical part will not be able
to pass the subject.
In accordance with the provisions of art. 13 of the Regulations on Academic Regime and Student Assessment of the University of Jaén, the evaluation of the subject will be global.
- Hacking Etico 101 : cómo hackear profesionalmente en 21 días o menos! : comprendiendo la mente del h. Edition: [2ª ed.] (actualizada a Kali 2.0). Author: Astudillo, Karina B. Publisher: [United States ] : CreateSpace, [2016] (Library)
- Seguridad informática : hacking Ético : conocer el ataque para una mejor defensa. Edition: 3ª ed. Author: -. Publisher: Cornellá de Llobregat : ENI, 2015 (Library)
- Hacking web technologies. Edition: -. Author: -. Publisher: Madrid : ZeroXword computing, 2016 (Library)
- SQL Injection. Edition: [3ª ed. rev. y amp.]. Author: Rando González, Enrique. Publisher: Madrid : OxWord, 2016 (Library)
- Hacking y forensic : desarrolle sus propias herramientas en Python. Edition: -. Author: Ebel, Franck. Publisher: Cornellá de Llobregat : Eni, 2016 (Library)
- Hacking and penetration testing with low power devices [Recurso electrónico]. Edition: 1st ed. Author: Polstra, Philip. Publisher: Waltham, MA : Syngress, c2015 (Library)
- Hacking with Kali [Recurso electrónico] : practical penetration testing techniques. Edition: 1st ed. Author: Broad, James. Publisher: Waltham, MA : Syngress, 2014 (Library)