Skip to main content

IPLUSO 24356

Penetration Tests

Computer Engineering and Applications
  • ApresentaçãoPresentation
    The "Penetration Testing" course covers techniques and tools used to identify and exploit vulnerabilities in systems, networks, and applications. It is part of the offensive cybersecurity field, essential for assessing the resilience of IT systems. This course complements security and networking subjects, offering practical insights into vulnerability analysis and simulated attacks. It prepares students for real-world scenarios, equipping them to identify and mitigate security risks. With increasing demand in the job market, this course provides essential technical skills to join cybersecurity teams and defend technological infrastructures.
  • ProgramaProgramme
    Strategic and operational impact of cyber threats (CP1) Social engineering and physical security (CP2) Reconnaissance and information gathering (CP3) Scanning, sniffing, and evasion (CP4) Web-based hacking versus network hacking (CP5) Vulnerability analysis versus penetration testing (CP6) Tools and methodologies for penetration testing (CP7) Defense in depth (CP8) Development of cybersecurity and cyber defense scenarios: Fundamentals, requirements analysis, and implementation (CP9) Framework for simulation exercises: Capture the Flag and Red/Blue Team (CP10)
  • ObjectivosObjectives
    The "Penetration Testing" course aims to equip students with the knowledge and skills to conduct effective penetration tests. Students will develop the ability to identify, analyze, and exploit vulnerabilities in systems, networks, and applications, using up-to-date tools and methodologies. They will be able to apply advanced techniques in reconnaissance, scanning, sniffing, and evading defense systems. In addition, they will gain skills in risk analysis, planning and executing simulated attacks, and implementing defense-in-depth measures. By the end of the course, students will have a practical and critical view of offensive security, capable of conducting controlled attacks, such as Capture the Flag exercises and Red Team/Blue Team operations.
  • BibliografiaBibliography
    Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy (2nd ed.). Syngress. ISBN 978-1-59749-655-1 Allen, J. (2019). The hacker playbook 3: Practical guide to penetration testing (3rd ed.). CreateSpace Independent Publishing Platform. ISBN 978-1980901754 Kaur, A., & Arora, K. (2018). Web penetration testing with Kali Linux: Explore the methods and tools of ethical hacking with Kali Linux (2nd ed.). Packt Publishing. ISBN 978-1788623377
  • MetodologiaMethodology
    The "Penetration Testing" course employs innovative methodologies that integrate theoretical teaching with practical and interactive activities. The theoretical lessons are supported by real-world scenario simulations and case studies, allowing students to apply the concepts learned in controlled environments. Practical learning is fostered through interactive labs where students use tools such as Metasploit, Burp Suite, and Nmap to conduct penetration tests on simulated systems. The use of virtual platforms for developing simulation environments, such as Capture the Flag and Red/Blue Team exercises, offers an immersive experience, enabling students to work both as attackers and defenders.  
  • LínguaLanguage
    Português
  • TipoType
    Semestral
  • ECTS
    6
  • NaturezaNature
    Mandatory
  • EstágioInternship
    Não