SYLLABUS
University: Technical University of Košice
Faculty: Faculty of Electrical Engineering and Informatics
Department: Department of Computers and Informatics
Course Number: 26001197 Course Name: Ethical hacking
Type, scope and method of learning activities:
Course Type: Lecture, Laboratory exercise
Recommended scope of the course content (in hours):
Full-time study (hours per week): 2,2
Part-time study (hours per semester): 26,26
Study Method: Attendance
Number of credits: 6
Recommended semester of study: ST
Recommended semester Study programme Study grade Study Method
1.rok ST Cybersecurity (KB_Ing_D_sk)
Informatics (INF_Ing_D_sk)
Informatics (INF_Ing_D_en)
Master
Master
Master
Attendance
Attendance
Attendance
Level of study:
Prerequisites:
Course completion requirements:
Assessment and completion of the course: Credit test and examination
Continuous assessment: Student passes the continuous assessment and receives credits when he or she meets the requirement to obtain at least 21% out of 40%.
Credit test
Final assessment: Student passes the final assessment and passes the examination when he or she meets the requirement to obtain at least 31% out of 60%.
Examination
Overall assessment: Overall assessment is the sum of the assessments obtained by students in the assessment period. The overall result is determined in accordance with the internal regulations of the Technical University in Košice. (Study Regulations, the internal regulation principles of doctoral studies)
Learning outcomes:
The course aims to acquire knowledge and skills of ethical hacking, which are used in penetration tests or ethical hacking. An ethical hacker is a trusted person who attempts to break into a network or computer systems using the same methods and techniques used by hackers, thus testing the resistance of the network and systems to hacker attacks.
Brief course content:
1. Obtaining information about the destination
2. Network scanning
3. Detailed information about the destination
4. Hacking systems
5. Malicious code
6. Tracking information
7. Social engineering
8. Session Hijacking
9. Hacking the Web
10. SQL Injection
11. Hacking mobile devices
12. Hacking wireless networks
Recommended Reference Sources:
1.  ERICKSON, J. Hacking: The Art of Exploitation. 2008.
2.  ENGEBRETSON, P. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy. 2011.
3.  HARPER, A., et al. Gray Hat Hacking The Ethical Hackers Handbook. 2011.
Recommended optional program components:
Languages required for the course completion:
Notes:
Course assessment:
Total number of students assessed: 12
  A B C D E FX  
  17% 17% 8% 17% 0% 42%  
Teacher:
doc. Ing. Anton Baláž, PhD.
Last modified: 01.09.2022
Approved by: person(s) responsible for the study program