Abertay University Hacking
What you study
An indicative list of topics that you will study as a student of Ethical Hacking is shown below:
Computer Architecture, Introduction to Security, Introduction to Object Oriented Programming, Software Design, Computer Networking 1
Data Structures & Algorithms 1, Web Application Development 1, Ethical Hacking 1, Data Structures & Algorithms 2, Digital Forensics 1
Computer Networking 2, Ethical Hacking 2, Team Project, Ethical Hacking 3, Software Development for Mobile
Digital Forensics 2, Current and Emerging Technologies, Research Methods, Penetration Testing
For more information on the course content, download the Programme information – BSc with Honours in Ethical Hacking
Why choose this course?
- Created in 2006, this course became the first undergraduate degree in the world with the word ‘hacking’ in the title. This course is now recognised as one of the UK’s leading vocational security programmes.
The modern computing world faces ever-changing security challenges. Hacker tactics, security vulnerabilities, advancing business practices and computing technologies are all evolving rapidly. Professionals with a broad-based expertise, solid pragmatic skills and an ability to “think-outside-the-box” are best placed to solve these security challenges.
This course aims to provide you with the knowledge and skills required to understand the mechanics behind hacking attacks, and develop appropriate countermeasures. In addition, you will gain the necessary background knowledge and technical skills to undertake security audit testing on computer networks and systems.
Modern software systems and applications are often extremely complex, so it is almost impossible to build solutions that are 100% secure at initial release. It is also far better for security loopholes to be identified and fixed by internal hackers rather than external ones.
Consequently, the business world is seeing a rapid increase in the demand for ethical – white hat – hackers, employed by companies to find security holes before criminal – black hat – hackers do.
How do hackers break into computer systems? Can they get into your computer? Is it easy to break into a corporate network and steal their secrets? Hackers are innately curious and want to pull things apart. They experiment and research. A hacker wants to learn and investigate.
The aim is for someone to arrive on this programme as a student and leave as an ethical hacker. During the programme, the security modules use a case-study approach which allows you to gain experience in investigating, analysing, testing, hacking and, ultimately, protecting real-life systems through the development of countermeasures.
The basic aim of this course is to provide a graduate with knowledge of how illegal computer attacks can be performed and how they can be stopped.