Siirry suoraan sisältöön

Software Exploitation (5 cr)

Code: TTKW0220-0K0V1

General information


Timing
01.01.2020 - 31.07.2020
Implementation has ended.
Number of ECTS credits allocated
5 cr
Local portion
5 cr
Mode of delivery
Contact learning
Unit
School of Technology
Teaching languages
English
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Mikko Neijonen
Groups
TTV17S1
Tieto- ja viestintätekniikka
Course
TTKW0220

Materials

Hacking the Art of Exploitation 2nd edition

Evaluation scale

0-5

Completion alternatives

Exam, labs and homework

Student workload

Lectures 65 h + independent study 70 h

Assessment criteria, satisfactory (1)

Excellent (5): The student understands all topics discussed during the course and is able to utilize them in an innovative manner even in challenging cases.
Very good (4): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most common cases.
Good (3): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most basic cases.
Satisfactory (2): The student understands the most basic topics discussed during the course, however, struggles to utilize this knowledge.
Sufficient (1): The student is familiar with the basic topics discussed during the course. He is able to solve problems related to the topics only in the simplest of cases.
Fail 0: The student does not meet the minimum criteria set for the course.

- The course is graded based on the exam and labs.

Teaching language

en

Number of ECTS credits allocated

5

Qualifications

Basics in programming, Data structures and algorithms

Content

The course will cover most common application vulnerabilities, what causes them, how they are exploited and how to fix or mitigate them. Basic knowledge of C or C++ and data structures and algorithms is required. Knowledge of one scripting language (e.g. Python) is recommended.

Objective

The student is aware of the most common application vulnerabilities and how they affect new and existing applications. The student is also able to find, exploit and fix common application vulnerabilities. The student is also familiar with safety mechanisms built into modern operating systems to make exploitation more difficult.

Siirry alkuun