ETHICAL HACKING

Course objectives

General objectives Ethical hackers are a category of professionals increasingly in demand by companies and governments aware of the need to effectively protect their infrastructure from possible cyberattacks. The course deals with the fundamentals of ethical hacking. In particular, it starts from the systematic study of the methodologies and tools used by hackers to carry out the various attacks in the cyberspace. Next, it illustrates how the professional of ethical hacking can carry out a series of legal and useful activities by subjecting the computer systems to vulnerability tests. These tests are intended to evaluate and prove the cybersecurity of an organization and to help owners and managers to become aware of, and solve their cybersecurity problems. Particular attention is paid to the practical application of the concepts learnt. Specific objectives The course explains in detail what hackers are doing, how hacking activities occur, how hackers illegally manage to enter a computer system protected by security measures, and how to defend against them. Knowledge and understanding Understanding the Ethical Hacking concepts and scope. Namelly, Casing the Establishment: the hacking techniques used to enumerate the targets completely. Endpoint and Server Hacking: the ultimate goals of any hacker including Advanced Persistent Threats. Infrastructure hacking: the way hackers attack the equipments our systems connect to. Application and Data Hacking: attacks to web/databases world as well as mobile hacking techniques. The countermeasures that can be used to hinder hackers' activities on the subsystems considered. Penetration testing execution standards. Application of knowledge and understanding At the end of the course, students will have the ability to analyze complex cybersystems and gain a better understanding of the target organization's vulnerabilities. Produce report in a manner that provides the most value to the target organization executives. Wisdom of judgement Students develop the ability to plan ethical hacking activities in a way that do not violate current applicable law. Ability to follow a code of ethical conduct and provide assurance of good intentions in conducting systems penetration testing activities. Communicative Capabilities Students will learn how to document their choices, including through the use of automated reporting tools. They will also have acquired the ability to prepare presentations on scientific subjects. Ability to pursue learning independently The notions acquired during the course will provide students with a solid knowledge in order to further investigate the most technical aspects, and to keep themselves informed about the continuous developments and updates of the ethical hacking sector.

Channel 1
LUIGI VINCENZO MANCINI Lecturers' profile

Program - Frequency - Exams

Course program
This course aim at the understanding the Ethical Hacking concepts and scope. The course content includes: Casing the Establishment: the hacking techniques used to enumerate the targets completely. Endpoint and Server Hacking: the ultimate goals of any hacker including Advanced Persistent Threats. Infrastructure hacking: the way hackers attack the equipments our systems connect to. Application and Data Hacking: attacks to web/databases world as well as mobile hacking techniques. This course presents the countermeasures that can be used to hinder hackers' activities on the subsystems considered, and the Penetration testing execution best-practise.
Prerequisites
This course requires basic knowledge of programming, operating systems, computer networks and cryptography.
Books
Title: Hacking exposed 7 : Network Security Secrets & Solutions Authors: George Kurtz, Joel Scambray, Stuart McClure Publisher: McGraw-Hill (2012) ISBN-10: 0071780289 ISBN-13: 978-0071780285
Teaching mode
The course is traditional in-person. In case of limitations due to COVID-19, in-person classes for a small number of students and streaming for the rest of the students.
Exam mode
Students are evaluated based on a written exam, on Assignments, and on Laboratory Assessments
Lesson mode
The course is traditional in-person. In case of limitations due to COVID-19, in-person classes for a small number of students and streaming for the rest of the students.
  • Lesson code1055682
  • Academic year2025/2026
  • Coursecorso|33516
  • CurriculumSingle curriculum
  • Year1st year
  • Semester2nd semester
  • SSDINF/01
  • CFU9
  • Subject areaFormazione informatica