Ethical hacking and pentesting
About
Would you like to understand how hackers think when attacking computer systems? Would you like to learn how to use that knowledge to protect such systems? Or maybe you are curious about competitions like CTFs and open bug bounty programs?
In this course you will learn through a simulated security engagement how to reason about cybersecurity, how attackers view systems, how to report security issues you find, and more importantly, how to think about the sustainability, legal and ethical consequences of your cybersecurity related activities.
The course will be complemented with various guest lectures, so you can also see how different actors in the cybersecurity world view and reason about system security.
This course is suitable for students wanting to deepen their knowledge and understanding of cybersecurity by learning how to identify vulnerabilities in computer systems and how to successfully report and fix them.
Prerequisites and selection
Entry requirements
- Completed at least 7.5 hec in programming.
- Completed one of the courses Computer Security (7.5 hec) or Cyber Security (7.5 hec), or equivalent.
- Completed at least 7.5 hec in computer networks.
- Completed, in addition to the above, 7.5 hec in the second cycle within cybersecurity or equivalent, for example, Network Security or Cryptography.
Applicants must prove knowledge of English: English 6/English level 2 or the equivalent level of an internationally recognized test, for example TOEFL, IELTS.
Selection
Selection is based upon the number of credits from previous university studies, maximum 285 credits