
COMPX519-22B (HAM)
Malware Analysis and Penetration Testing
15 Points
Staff
Convenor(s)
Vimal Kumar
4378
G.2.26
vimal.kumar@waikato.ac.nz
|
|
Administrator(s)
Librarian(s)
You can contact staff by:
- Calling +64 7 838 4466 select option 1, then enter the extension.
-
Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
- For extensions starting with 4: dial +64 7 838 extension.
- For extensions starting with 5: dial +64 7 858 extension.
- For extensions starting with 9: dial +64 7 837 extension.
- For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
Paper Description
In practical cyber security landscape two main complementary approaches have evolved; offensive security and defensive security. In this paper we will cover the defensive security topic of malware analysis to understand, analyse and detect malicious code. We will further cover offensive security techniques of SQL injection and cross site scripting in depth which are useful when performing penetration testing. Knowledge of such offensive and defensive security approaches is an essential part of software engineering too.
The learning outcomes for this paper are linked to Washington Accord graduate attributes WA1-WA11. Explanation of the graduate attributes can be found at: https://www.ieagreements.org/
Paper Structure
Learning Outcomes
Students who successfully complete the paper should be able to:
Assessment
Assessment Components
The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam.
Required and Recommended Readings
Required Readings
Recommended Readings
Online Support
Workload
Per week:
2 hours - Lectures
10 hours - Assignments and Readings
Linkages to Other Papers
Prerequisite(s)
Prerequisite papers: (COMPX201 or COMPX241) and COMPX203 and COMPX304