Module Descriptors
PENETRATION TESTING
COCS71151
Key Facts
Digital, Technology, Innovation and Business
Level 7
15 credits
Contact
Leader: Christopher Hawkins
Hours of Study
Scheduled Learning and Teaching Activities: 39
Independent Study Hours: 111
Total Learning Hours: 150
Pattern of Delivery
  • Occurrence B, Stoke Campus, PG Semester 2
  • Occurrence H, Asia Pacific Institute of Information Technology Sri Lanka (Colombo), PG Semester 2
Sites
  • Asia Pacific Institute of Information Technology Sri Lanka (Colombo)
  • Stoke Campus
Assessment
  • PRACTICAL BASED PORTFOLIO - 3000 words weighted at 100%
Module Details
Module Additional Assessment Details
One practical-based portfolio assessment weighted at 100% of the module mark (3000 words excluding appendices) addressing all of the learning outcomes (Learning Outcomes 1 to 4).
Module Indicative Content
This module will cover a range of topics including:

• Penetration Testing Methodologies
• Scripting in Python and Bash
• Intelligence Gathering
• Vulnerability Identification and Analysis
• Network Attacks
• Windows & Linux Exploitation
• Post-Exploitation
• Penetration test report writing
Module Learning Strategies
The material will be presented through a combination of lectures, tutorials, practical exercises and directed self-study.

The lectures given will be covering the theoretical content of the module giving the students a detailed understanding of various penetration testing techniques. The tutorial sessions will be provided to allow for discussion and practical exercises to be carried out. The tutorial sessions will be used to allow the student to experiment within a penetration testing environment.

Teaching delivery will consist of 12 hours of lectures and 24 hours practical/tutorial sessions.
Module Resources
A pen testing laboratory with access to purposely built vulnerable machines.
Module Special Admissions Requirements
None
Module Texts
Weidman, G., (2014), Penetration testing: a hands-on introduction to hacking, 1st edition, No Starch Press, San Francisco, California, ISBN-13: 978-1-59327-564-8

Basta, A. (2013), Computer security and penetration testing, 2nd edition, Delmar, Australia, ASIN: B00L71SAZS

Broad, J., and Bindner, A. (2014), Hacking with Kali: practical penetration testing techniques, 1st edition, Syngress, Amsterdam, ISBN: 9780124077492
Module Learning Outcomes
1. Demonstrate critical knowledge of the tools, methods and procedures used in Penetration Testing. Knowledge & Understanding
Reflection

2. Research and critically evaluate security techniques used to perform vulnerability, and discovery tasks. Enquiry
Reflection

3. Demonstrate systematic understanding and practical ability to conduct a penetration test.
Application
Problem Solving

4. Communicate effectively the results of penetration testing.
Communication
Reflection


Module Learning Strategies
The material will be presented through a combination of lectures, tutorials, practical exercises and directed self-study.

The lectures given will be covering the theoretical content of the module giving the students a detailed understanding of various penetration testing techniques. The tutorial sessions will be provided to allow for discussion and practical exercises to be carried out. The tutorial sessions will be used to allow the student to experiment within a penetration testing environment.

Teaching delivery will consist of 13 hours of lectures and 26 hours practical/tutorial sessions.
Web Descriptor
This module will provide you with in-depth practical and theoretical knowledge that is needed in order to conduct a full scale penetration test. The module focuses on practical skills when using penetration tools, but also covers soft skills related to reporting.