Official course description, subject to change:

Preliminary info last published 15/11-23
Course info
Language:
English
ECTS points:
7.5
Course code:
KSETHAC1KU
Participants max:
40
Offered to guest students:
yes
Offered to exchange students:
yes
Offered as a single subject:
yes
Price for EU/EEA citizens (Single Subject):
10625 DKK
Programme
Level:
MSc. Master
Programme:
MSc in Computer Science
Staff
Course semester
Semester
Forår 2025
Start
27 January 2025
End
30 May 2025
Exam
Exam type
ordinær
Internal/External
ekstern censur
Grade Scale
7-trinsskala
Exam Language
GB
Abstract
This is an applied course on information security. The course focuses on in-depth penetration testing techniques, elements of cryptanalysis and digital forensics, ethical aspects of security and responsible disclosure.
Description

In this course you will gain the skills necessary to become a security analyst/penetration tester. You will have already taken an introductory course on information security, and this course will give you an opportunity to learn more advanced tools for software analysis and exploitation, learn about the ethics of hacking and the responsible disclosure process.

The course will cover the following topics:

  1. Ethics of hacking and responsible disclosure
  2. Advanced exploitation tools (reconnaissance and payload generation)
  3. Elements of cryptanalysis
  4. Digital forensics
Formal prerequisites

Before the course you must:

  1. Be familiar with security principles and risk analysis,
  2. Be familiar with network security, web and binary penetration testing
  3. Know basics of security protocols and cryptography
  4. Know basic algorithms and data structures
  5. Be familiar with operating systems and architectures, databases and compilers
  6. Have implemented at least two medium-size programming projects


Intended learning outcomes

After the course, the student should be able to:

  • Apply the principle of responsible disclosure
  • Discuss ethical issues in computer security
  • Apply cryptanalysis to break vulnerable encryption schemes
  • Apply semi-automated exploitation tools for web/database/binary vulnerabilities
  • Conduct digital forensics analysis
Ordinary exam
Exam type:
D: Submission of written work with following oral, External (7-point scale)
Exam variation:
D1G: Submission for groups with following oral exam based on the submission. Shared responsibility for the report.