DM895: Applied Cyber Security
The Study Board for Science
Teaching language: Danish or English depending on the teacher, but English if international students are enrolled
EKA: N340128102
Assessment: Second examiner: Internal
Grading: 7-point grading scale
Offered in: Odense
Offered in: Autumn
Level: Master
STADS ID (UVA): N340128101
ECTS value: 5
Date of Approval: 31-03-2023
Duration: 1 semester
Version: Approved - active
Entry requirements
Academic preconditions
The contents of DM536/DM550/DM574 Introduction to Programming, DM510 Operating System, DM572 Network, and Cybersecurity must be known.
Course introduction
The purpose of this course is to give an understanding of the vulnerabilities commonly found in systems and services by adopting an ethical hacking approach, showing the mechanisms of common exploitations and the impact of successful attacks.
In relation to the competence profile of the degree it is the explicit focus of the course to:
- provide knowledge in a defined subject area that is based on the highest international field of research within the field of computer science
- develop skills in describe, analyze and solve advanced computer science problems using the learned models
- give the competence to plan and carry out scientific projects at a high professional level, including managing work and development situations that are complex, unpredictable and require new solution models
Expected learning outcome
The learning objective of the course is that the student demonstrates the ability to:
- Classify attack vectors and identify the vulnerability surface of a system
- Apply basic hardening measures to system configuration
- Set up essential intrusion detection tools
- Explain the causes of software vulnerabilities and test the effectiveness of exploits
Content
The following main topics are contained in the course: operating system integrity, software integrity and authenticity, access control models, privilege escalation, system monitoring, intrusion detection, binary exploitation, web application security, and penetration testing methodology.
Literature
Examination regulations
Exam element a)
Timing
Autumn and January
Tests
Project with a written report
EKA
N340128102
Assessment
Second examiner: Internal
Grading
7-point grading scale
Identification
Full name and SDU username
Language
Normally, the same as teaching language
Examination aids
Allowed, a closer description of the exam rules will be posted i itslearning.
ECTS value
5
Additional information
The reports should be submitted during the exam period.
Indicative number of lessons
Teaching Method
At the faculty of science, teaching is organized after the three-phase model ie. intro, training, and study phase.
These teaching activities are reflected in an estimated allocation of the workload of an average student as follows:
These teaching activities are reflected in an estimated allocation of the workload of an average student as follows:
- Intro phase (lectures) - 20 hours
- Training phase: 20 hours
The intro phase facilitates an introduction to new material and topics, which in the skills training phase are processed with exercises prepared at home and discussed in class to validate the acquired knowledge.
Activities during the study phase: reading from textbooks, solving homework, and applying acquired knowledge to practical projects.
Teacher responsible
Additional teachers
Timetable
Administrative Unit
Team at Educational Law & Registration
Offered in
Recommended course of study
Transition rules
Transitional arrangements describe how a course replaces another course when changes are made to the course of study.
If a transitional arrangement has been made for a course, it will be stated in the list.
See transitional arrangements for all courses at the Faculty of Science.