Software Exploitation (5 cr)
Code: TTKW0220-3001
General information
- Enrollment
-
04.01.2021 - 15.01.2021
Registration for the implementation has ended.
- Timing
-
29.03.2021 - 30.04.2021
Implementation has ended.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 0 cr
- Virtual portion
- 5 cr
- Mode of delivery
- Online learning
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 32
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Mikko Neijonen
- Teacher in charge
- Joonatan Ovaska
- Groups
-
TTV21VKTieto- ja viestintätekniikka (AMK), vaihto-opiskelu/Exchange studies
-
TTV18S1Tieto- ja viestintätekniikka
- Course
- TTKW0220
Evaluation scale
0-5
Objective
The student is aware of the most common application vulnerabilities and how they affect new and existing applications. The student is also able to find, exploit and fix common application vulnerabilities. The student is also familiar with safety mechanisms built into modern operating systems to make exploitation more difficult.
Content
The course will cover most common application vulnerabilities, what causes them, how they are exploited and how to fix or mitigate them. Basic knowledge of C or C++ and data structures and algorithms is required. Knowledge of one scripting language (e.g. Python) is recommended.
Location and time
Five week intensive course starting at week 12
Materials
Hacking: The Art Of Exploitation, 2nd Edition (Erickson, Jon)
Teaching methods
- lectures
- independent study
- small group learning
- exercises
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 10 h
- assignment 65 h
- independent study 60 h
Total 135 h
Assessment criteria, satisfactory (1)
Excellent (5): The student understands all topics discussed during the course and is able to utilize them in an innovative manner even in challenging cases.
Very good (4): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most common cases.
Good (3): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most basic cases.
Satisfactory (2): The student understands the most basic topics discussed during the course, however, struggles to utilize this knowledge.
Sufficient (1): The student is familiar with the basic topics discussed during the course. He is able to solve problems related to the topics only in the simplest of cases.
Fail 0: The student does not meet the minimum criteria set for the course.
- The course is graded based on the exam and labs.
Qualifications
Basics in programming, Data structures and algorithms
Further information
Exchange students 5 places