Universidad de Jaén

Menú local

Syllabus 2019-20 - 77212008 - Ethical Hacking (Hacking ético)

Caption
  • Level 1: Tutorial support sessions, materials and exams in this language
  • Level 2: Tutorial support sessions, materials, exams and seminars in this language
  • Level 3: Tutorial support sessions, materials, exams, seminars and regular lectures in this language
DEGREE: Máster Univ. en Seguridad informática (77212008)
FACULTY: Centre for Postgraduate Studies of the University of Jaen

DEGREE: Máster en Ingeniería informática (74013007)
FACULTY: SCHOOL OF ENGINEERING OF JAÉN

DEGREE: Doble Máster en Ingeniería informática y Seguridad informática (77612008)
FACULTY: SCHOOL OF ENGINEERING OF JAÉN

ACADEMIC YEAR: 2019-20
SYLLABUS
1. COURSE BASIC INFORMATION
NAME: Ethical Hacking
CODE: 77212008 (*) ACADEMIC YEAR: 2019-20
LANGUAGE: English LEVEL: 1
ECTS CREDITS: 4.0 YEAR: 1 SEMESTER: PC
 
2. LECTURER BASIC INFORMATION
NAME: GARCÍA CUMBRERAS, MIGUEL ÁNGEL
DEPARTMENT: U118 - INFORMÁTICA
FIELD OF STUDY: 570 - LENGUAJES Y SISTEMAS INFORMÁTICOS
OFFICE NO.: A3 - 112 E-MAIL: magc@ujaen.es P: 953212420
WEBSITE: http://blogs.ujaen.es/magc/
LANGUAGE: - LEVEL: 1
 
3. CONTENT DESCRIPTION

  1. Introduction
    Ethical Hacking and Essential Terminology
    Security elements
    Hacker Phases
    Types of hackers
    Types of Safety Test
  2. Obtaining information
    Pre-attack: Footprinting and scanning
    Methodology for obtaining information
    Google hacking
    Whois
    Nslookup
    Traceroute
    Thread Tools
  3. Scanning
    Ping
    Ping sweeps
    Port scanning techniques
    Types of scans
    Nmap and other tools
  4. Vulnerabilities
    What is enumeration?
    Null sessions and countermeasures
    Nessus
    Active directory
  5. System Hacking
    Entry into systems: tests, dictionary
    Password sniffing
    Types of password attacks
    Crack of passwords
    Keyloggers
    Escalation of privileges
    DoS Attacks
    Erasing of footprints
    Anonymous navigation
  6. Web Attacks
  7. Metasploit
  8. Exploitation

4. COURSE DESCRIPTION AND TEACHING METHODOLOGY

Theory: exposition of theoretical concepts. 

Practices: practical implementation of the techniques studied in theory classes. Delivery of internships at established dates.

Students with special educational needs should contact the Student Attention Service (Servicio de Atención y Ayudas al Estudiante) in order to receive the appropriate academic support

5. ASSESSMENT METHODOLOGY

Attendance and participation (measured by the teacher's follow-up grades) which is 20% of the final grade:

  • Parts of signatures of attendance to practices
    Participation in the debates
    Participation in work on different topics

Theoretical concepts:

Measured by examination conducted through the virtual teaching platform, which accounts for 30% of the final grade (CB6, CB7 and CB10 Competences; Results RB6, RB7, RB7b, RB7c, RB10, RE08MSE and RG1mSEGI).

Practical concepts:

Measured by the delivery of practices during the duration of the course, which represents 50% of the final grade (Competences E8MSEGI, CTI3, CTI4 and CB7; Results RE08MSE, RG1mSEGI, RT3 and RT4).
Those who have not passed the practical part will not be able to pass the subject.

In accordance with the provisions of art. 13 of the Regulations on Academic Regime and Student Assessment of the University of Jaén, the evaluation of the subject will be global.

6. BOOKLIST
MAIN BOOKLIST:
  • Hacking Etico 101 : cómo hackear profesionalmente en 21 días o menos! : comprendiendo la mente del h. Edition: [2ª ed.] (actualizada a Kali 2.0). Author: Astudillo, Karina B. Publisher: [United States ] : CreateSpace, [2016]  (Library)
  • Seguridad informática : hacking Ético : conocer el ataque para una mejor defensa. Edition: 3ª ed. Author: -. Publisher: Cornellá de Llobregat : ENI, 2015  (Library)
ADDITIONAL BOOKLIST:
  • Hacking web technologies. Edition: -. Author: -. Publisher: Madrid : ZeroXword computing, 2016  (Library)
  • SQL Injection. Edition: [3ª ed. rev. y amp.]. Author: Rando González, Enrique. Publisher: Madrid : OxWord, 2016  (Library)
  • Hacking y forensic : desarrolle sus propias herramientas en Python. Edition: -. Author: Ebel, Franck. Publisher: Cornellá de Llobregat : Eni, 2016  (Library)
  • Hacking and penetration testing with low power devices [Recurso electrónico]. Edition: 1st ed. Author: Polstra, Philip. Publisher: Waltham, MA : Syngress, c2015  (Library)
  • Hacking with Kali [Recurso electrónico] : practical penetration testing techniques. Edition: 1st ed. Author: Broad, James. Publisher: Waltham, MA : Syngress, 2014  (Library)