Chat with us, powered by LiveChat

Penetration Testing

Penetration Testing is available as a postgraduate-level Cyber Security subject offered by the International College of Management, Sydney (ICMS). Please click the button below to find a postgraduate course suitable for you.

 

Subject Code:

CYB806A

Subject Type:

Elective

Pre-requisites:

  • CYB601A Enterprise and Network Cyber Security 
  • CYB701A Cyber Security Management 
  • ICT701A Software Design and Construction 

Course level study pre-requisite: a total of 16 credit points (4 subjects) prior to enrolling into the subject 

Co-requisite:

  • CYB804A Cyberlaw, Ethics and Governance 

Subject Level:

800

Credit Points:

4 credit points

Subject Aim:

With cyber threats on the rise, organisations require professionals skilled in ethical hacking and penetration testing to proactively identify vulnerabilities and fortify their defences. This subject equips students with in-depth knowledge and hands-on experience to navigate the complex cyber threat landscape.  

Students will gain both theoretical and practical expertise in vulnerability identification and exploitation. This includes researching various types of vulnerabilities that can affect organisations and learning how to generate comprehensive reports to assess their impact. 

The subject covers network and web application testing, empowering students to conduct penetration testing in a variety of simulated environments within the ICMS digital ecosystem.  

Students will also learn about the importance of penetration testing within the broader context of appraising and developing appropriate policies and procedures to mitigate vulnerability risks. 

Upon completion of the subject, students will possess the knowledge and skills needed to identify vulnerabilities, evaluate their associated risks, carry out penetration testing, and select and customise effective policies and procedures to safeguard against vulnerabilities. 

Learning Outcomes:

a) Integrate in-depth knowledge of key concepts and industry-recognised best practices in the field of ethical hacking and cyber security assessment.  

b) Critically assess security weaknesses based on identified system vulnerabilities across a variety of networks, systems and applications.

c) Apply penetration testing industry-standard tools and methodologies to investigate organisational security posture and communicate the outcomes to relevant stakeholders. 

d) Critically analyse and advise on cybersecurity policy, procedures and frameworks in safeguarding digital assets and promoting secure behaviour within the broader organisational context. 

Assessment Information:

Learning outcomes for this subject are assessed using a range of assessment tasks as described in the table below.

Broad topics to be covered: 

Topic: 
Week 1: Introduction to Penetration Testing 

  • Introduction to Ethical Hacking 
  • Element of Information Security 
  • Penetration Testing Phases (Continued) 
  • Cyber Kill Chain Methodology 
  • Foot Printing & Reconnaissance 
  • White Box, Black Box, Grey Box Penetration Testing 
Week 2: Information Gathering and Network Scanning 

  • Intelligence Gathering 
  • Network and Port Scanning Techniques 
  • Enumeration 
Week 3: Vulnerabilities and Exploitation 

  • Vulnerability Research & Tools 
  • Vulnerability Assessment Reports 
  • IoT Vulnerabilities 
  • Password Cracking 
  • Privilege Escalation 
  • Steganography Detection Tools 
Week 4: Threats, Attacks, and Network Penetration Testing 

  • Malware Components 
  • Malware Analysis & Static Malware 
  • Virus Detection Method 
  • Malware Detection Tools 
  • Network Penetration Testing (Internal) 
  • Network Penetration Testing (External) 
Week 5: Advanced Attack Techniques 

  • Network Sniffing Tools 
  • ARP Poisoning Tools 
  • DNS Poisoning Tools 
  • Social Engineering Penetration Testing 
  • Identity Theft 
Week 6: Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks 

  • DoS and DDoS Attack Techniques 
  • DoS and DDoS Attack Detection Techniques 
Week 7: Session Hijacking and Evasion 

  • Session Hijacking Detection/Prevention Methods 
  • Intrusion Detection Systems/Intrusion Prevention Systems 
Week 8: Evading Security Measures 

  • Firewall Evasion Techniques/Tools 
  • DNS Server Hijacking 
  • Web Server Hijacking 
Week 9: Web Application and Wireless Attacks 

  • Web Cache Poison Attacks 
  • Web Server/Application Attack Tools and Methodologies 
  • Web Server Security Tools 
  • SQL Injection 
  • Wireless Threats and Hacking Methodologies 
Week 10: Penetration Testing Cyber Security Policies and Procedures  

  • Penetration Testing Cyber Security Policies and Procedures – Introduction 
  • Compliance Audits and Penetration Testing 
  • Penetration Testing Risk Assessment and Management  
  • Penetration testing as part of a risk management policy 
  • Security Management Maintenance Model in the context of penetration testing 
Week 11: Penetration Testing Stakeholder Management, Cyber Teams, Culture and Training 

  • Stakeholder Management for penetration testing and its impact 
  • Cyber security team structures 
  • Build, Attack, Defend Teams 
  • Security Culture and Training in the context of ever-changing cyber security landscape 

 

Please note that these topics are often refined and subject to change so for up to date weekly topics and suggested reading resources, please refer to the Moodle subject page.