Ethical hacking, penetration testing, and IT forensics, 7.5 hp
In this course, a number of tools and methods to improve cyber security are studied. Some of the methods are preventive and used to improve protection, and some are reactive and are used to handle suspected attacks.
Preventive methods are ethical hacking and penetration testing. Ethical hacking uses methods like vulnerability research, threat analysis, and vulnerability reporting. The market for vulnerabilities is also discussed. Penetration testing uses methods like reconnaissance, scanning for vulnerabilities, exploitation of vulnerabilities, and credentials cracking.
Reactive methods are log handling, IT incident handling, and IT forensics. Subjects in log handling are secure logging and log analysis. Subjects in IT incident handling are the different phases of incident handling, preparation, identification, containment, eradication, and recovery. Subjects in IT forensics are acquisition and preservation of digital evidence.
FACTS
CYCLE
Second cycle
ENTRY REQUIREMENTS
General entry requirements and approved result from the following course/courses: PFC600-Principles of cybersecurity or the equivalent.
PACE OF STUDY
Part-time
TYPE OF INSTRUCTION
On Campus
PROGRAMME/COURSE DATE
TEACHING HOURS
Daytime
APPLICATION DEADLINE
15 October 2026
APPLICATION CODE
HV-E3257
START/END
From v.13 2027 to v.22 2027
Do you need help?
Entry requirements, selection, admission, study counselling and other questions