Aims & Outcomes

By the end you should be able to:-


  1. Describe current tools and techniques used by ethical and malicious hackers to compromise security systems.
  2. Explain current legislation relating to computer crime and hacking.
  3. Perform a routine penetration test on a computer system within a controlled environment.
Ethical Hacker

For each outcome, course participants should be able to:-

security fundementals

Outcome 1

Describe current tools and techniques used by ethical and malicious hackers to compromise security systems.

  1. Describe the phases of an ethical hack and a malicious cyber-attack.
  2. Describe different computer tools and techniques that can be used to compromise computer systems.
  3. Describe different social engineering tools and techniques that could be used to compromise computer systems.
data security

Outcome 2

Explain current legislation relating to computer crime and hacking.

  1. Explain current legislation relating to computer crime and hacking.
  2. Explain the use of a simple framework for engaging in penetration testing activities that protects organisations and individuals from prosecution.
  3. Explain the use of a simple framework for engaging in penetration testing activities that protects organisations and individuals from loss of confidentiality, integrity and availability of computer systems.
digital forensics

Outcome 3

Perform a routine penetration test on a computer system within a controlled environment.

  1. Identify the scope of a routine penetration test on a computer system.
  2. Perform reconnaissance on a penetration test scenario's footprint.
  3. Perform scanning and enumeration on a penetration test.
  4. Perform vulnerability and scanning on a penetration test.
  5. Identify the risks, threats and vulnerabilities that have been exposed by the penetration test.
  6. Communicate the results of a penetration test.
  7. Maintain a professional and ethical standing throughout all phases of a penetration test.

Careers & the future


Ethical hacking is big business. With more and more businesses going on line, sharing information, working with others, developing web applications, the need to make sure that no one can break in, is getting more and more important. Have a quick look at CYFOR, one of the leading Forensic and Pen-testing companies in London.

For many, the first step is to become a certified ethical hacker. Many courses are available and they don't always require you to go to university. Many reputable companies offer such courses and being certified (and I don't mean in schizophrenic Mr Robot kind of way.) can lead to exciting rewarding career.

Rounded Image
Tasks

Hackers can change the world. And their power is growing as IoT develops. Even now, authorities are concerned about hackers breaking into heart pacemakers, taking control with literally having the power of life and death.

Watch the video. It emphasises just some of the possibilities available to the hacker, many of which have been already discussed. In it, Pablo highlights some of the distinguishing characteristics of the hacker. They have a sideways view of the world. It's not what things are, but how they can be adapted to fill other purposes. He also shows how this unlikely skills can open pathways to solve unusual world change problems.

You should be able to:-
  • Know the essential outcomes for this part of the course.
  • Know that Ethical Hacking leads on to Certified courses leading to established career paths.
  • Know that hackers are highly creative people who have an unusual take on the world..

If you don't feel confident in meeting any of these performance criteria, ask your teacher or re-read the information again.

Cyber Security

  • Security Fundamentals
  • Data Security
  • Digital Forensics
  • Ethical Hacking
Supporting courses by the SQA Logo
css badge
html badgee