Back to Modules
CS446

Offensive Cybersecurity

1 CreditsBoth

Description

The Offensive Cybersecurity course aims to equip students with knowledge and technical skills in the fields of Penetration Testing and Offensive Security Tactics. The course will introduce the tools used in these fields and provide students hands-on experience to accomplish a mock engagement. Students will also learn the reporting structure and professional standards of a Security Engineer. The course also aims to equip students with skills that can be used and/or transferred to professional certifications exams/courses recognized by the industry. Upon completion of the course, students will be able to: ❖ Apply the key tools and methodologies used in Offensive Security ❖ Assess the ethical considerations to perform Offensive Security ❖ Analyse and evaluate Offensive Security test projects ❖ Satisfy the reporting requirements for Offensive Security

Requisites

Prerequisites: CS440 - Pre-req

Co-requisites: None

Anti-requisites: None

Attributes

Department: SCIS

Course Level: Undergraduate

Tracks: CS/IS: Cybersecurity Track IS/T4BS: Product Development Track

Areas: IS Depth Electives IT Solution Development Electives

Learning Outcomes

By the end of the course, students should be able to:   Apply the key tools and methodologies used in Offensive Security   Assess the ethical considerations to perform Offensive Security   Analyse and evaluate Offensive Security test projects   Satisfy the reporting requirements for Offensive Security    Explain concepts and principles of Offensive Security in terms of the stages of penetration testing   Explain the concepts of planning an Offensive Security test project   Apply the concepts of reconnaissance in computer network environments to achieve intelligence gathering   Apply the concepts of enumeration in computer network environments to understand the target environment   Apply the concepts of Offensive Security Tactics to achieve Penetration Test goals   Explain the difference root causes of a security issue discovered during a Penetration Test.   Explain the concepts of network security   Explain the concepts of web application security   Apply the correct reporting standards for a Penetration Test Engagement   Provide mitigations and recommendations based on Penetration Test Engagement results  

Graduate Learning Outcomes

Disciplinary knowledge

Competencies

Cloud Computing, Pattern Recognition Systems, Problem-solving & analysis, Security Administration, Security Architecture