Skip to main content

Software Exploitation (5 cr)

Code: TTC6520-3004

General information


Enrollment

18.11.2024 - 09.01.2025

Timing

13.01.2025 - 30.04.2025

Number of ECTS credits allocated

5 op

Virtual portion

5 op

Mode of delivery

Online learning

Unit

School of Technology

Campus

Lutakko Campus

Teaching languages

  • English

Seats

0 - 35

Degree programmes

  • Bachelor's Degree Programme in Information and Communications Technology
  • Bachelor's Degree Programme in Information and Communications Technology

Teachers

  • Joonatan Ovaska

Groups

  • TTV22S5
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S2
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S3
    Tieto- ja viestintätekniikka (AMK)
  • TIC22S1
    Bachelor's Degree Programme in Information and Communications Technology
  • TTV22S1
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM
    Tieto- ja viestintätekniikka (AMK)
  • TTV22S4
    Tieto- ja viestintätekniikka (AMK)
  • TTV22SM2
    Tieto- ja viestintätekniikka (AMK)
  • 13.01.2025 12:15 - 16:00, Ethical Hacking -moduulin opintojaksoinfo
  • 16.01.2025 13:30 - 16:00, Workshop
  • 21.01.2025 14:00 - 16:30, Workshop
  • 23.01.2025 13:30 - 16:00, Workshop
  • 28.01.2025 14:00 - 16:30, Workshop
  • 30.01.2025 13:30 - 16:00, Workshop
  • 04.02.2025 14:00 - 16:30, Workshop
  • 06.02.2025 13:30 - 16:00, Workshop
  • 11.02.2025 14:00 - 16:30, Workshop
  • 13.02.2025 13:30 - 16:00, Workshop
  • 18.02.2025 14:00 - 16:30, Workshop
  • 20.02.2025 13:30 - 16:00, Workshop
  • 04.03.2025 14:00 - 16:30, Workshop
  • 05.03.2025 12:00 - 13:30, Software Exploitation TTC6520-3004
  • 06.03.2025 13:30 - 16:00, Workshop
  • 11.03.2025 14:00 - 16:30, Workshop
  • 12.03.2025 12:00 - 13:30, Software Exploitation TTC6520-3004
  • 13.03.2025 13:30 - 16:00, Workshop
  • 18.03.2025 14:00 - 16:30, Workshop
  • 19.03.2025 12:00 - 13:30, Software Exploitation TTC6520-3004
  • 20.03.2025 13:30 - 16:00, Workshop
  • 25.03.2025 14:00 - 16:30, Workshop
  • 26.03.2025 12:00 - 13:30, Software Exploitation TTC6520-3004
  • 27.03.2025 13:30 - 16:00, Workshop
  • 01.04.2025 14:00 - 16:30, Workshop
  • 02.04.2025 12:00 - 13:30, Software Exploitation TTC6520-3004
  • 03.04.2025 13:30 - 16:00, Workshop
  • 08.04.2025 14:00 - 16:30, Workshop
  • 10.04.2025 13:30 - 16:00, Workshop
  • 15.04.2025 14:00 - 16:30, Workshop
  • 17.04.2025 13:30 - 16:00, Workshop
  • 22.04.2025 14:00 - 16:30, Workshop
  • 24.04.2025 13:30 - 16:00, Workshop
  • 29.04.2025 14:00 - 16:30, Workshop

Objectives

The student knows the most common application vulnerabilities and how they affect new and existing applications. The student is also able to find, exploit and fix common application vulnerabilities. The student is also familiar with safety mechanisms built into modern operating systems to make exploitation more difficult.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

The course will cover most common application vulnerabilities, what causes them, how they are exploited and how to fix or mitigate them. Basic knowledge of C or C++ and data structures and algorithms is required. Knowledge of one scripting language (e.g. Python) is recommended.

Learning materials and recommended literature

Materials in the e-learning environment and a book: Hacking : the art of exploitation 2nd edition

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks
- book

Exam dates and retake possibilities

No exam, assessment is based on assignments.

Alternative completion methods

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 10 h
- reading assignments 15 h
- independent study 60 h
- assignment solving 40 h
- assignment reporting 10 h
Total 135 h

Content scheduling

We start by going through whole course theory, after all theory parts, we'll continue with hands-on assignments for the rest of the course.

Further information for students

Points from the quizzes and from the labs. No exam

Evaluation scale

0-5

Evaluation criteria, satisfactory (1-2)

Satisfactory (2): The student understands the most basic topics discussed during the course, however, struggles to utilize this knowledge.
Sufficient (1): The student is familiar with the basic topics discussed during the course. He is able to solve problems related to the topics only in the simplest of cases.
Fail 0: The student does not meet the minimum criteria set for the course.

Evaluation criteria, good (3-4)

Very good (4): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most common cases.
Good (3): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most basic cases.

Evaluation criteria, excellent (5)

Excellent (5): The student understands all topics discussed during the course and is able to use them in an innovative manner even in challenging cases.

Prerequisites

Basics in programming, Data structures and algorithms