Abertay University Hacking

Abertay University Hacking

What you study

An indicative list of topics that you will study as a student of Ethical Hacking is shown below:

Year 1
Computer Architecture, Introduction to Security, Introduction to Object Oriented Programming, Software Design, Computer Networking 1

Year 2
Data Structures & Algorithms 1, Web Application Development 1, Ethical Hacking 1, Data Structures & Algorithms 2, Digital Forensics 1

Year 3
Computer Networking 2, Ethical Hacking 2, Team Project, Ethical Hacking 3, Software Development for Mobile

Year 4
Digital Forensics 2, Current and Emerging Technologies, Research Methods, Penetration Testing

For more information on the course content, download the Programme information – BSc with Honours in Ethical Hacking

 

Why choose this course?

  • Created in 2006, this course became the first undergraduate degree in the world with the word ‘hacking’ in the title.  This course is now recognised as one of the UK’s leading vocational security programmes.

The modern computing world faces ever-changing security challenges. Hacker tactics, security vulnerabilities, advancing business practices and computing technologies are all evolving rapidly. Professionals with a broad-based expertise, solid pragmatic skills and an ability to “think-outside-the-box” are best placed to solve these security challenges.

This course aims to provide you with the knowledge and skills required to understand the mechanics behind hacking attacks, and develop appropriate countermeasures. In addition, you will gain the necessary background knowledge and technical skills to undertake security audit testing on computer networks and systems.

Modern software systems and applications are often extremely complex, so it is almost impossible to build solutions that are 100% secure at initial release. It is also far better for security loopholes to be identified and fixed by internal hackers rather than external ones.

Consequently, the business world is seeing a rapid increase in the demand for ethical – white hat – hackers, employed by companies to find security holes before criminal – black hat – hackers do.