Skip to main content

Software Exploitation (5 cr)

Code: TTC6520-3004

General information


Enrollment
18.11.2024 - 09.01.2025
Registration for the implementation has ended.
Timing
13.01.2025 - 30.04.2025
Implementation is running.
Number of ECTS credits allocated
5 cr
Local portion
0 cr
Virtual portion
5 cr
Mode of delivery
Online learning
Unit
School of Technology
Campus
Lutakko Campus
Teaching languages
English
Seats
0 - 35
Degree programmes
Bachelor's Degree Programme in Information and Communications Technology
Bachelor's Degree Programme in Information and Communications Technology
Teachers
Joonatan Ovaska
Groups
TTV22S5
Tieto- ja viestintätekniikka (AMK)
TTV22S2
Tieto- ja viestintätekniikka (AMK)
TTV22S3
Tieto- ja viestintätekniikka (AMK)
TIC22S1
Bachelor's Degree Programme in Information and Communications Technology
TTV22S1
Tieto- ja viestintätekniikka (AMK)
TTV22S4
Tieto- ja viestintätekniikka (AMK)
Course
TTC6520

Realization has 34 reservations. Total duration of reservations is 81 h 15 min.

Time Topic Location
Mon 13.01.2025 time 12:15 - 16:00
(3 h 45 min)
Ethical Hacking -moduulin opintojaksoinfo
P2_D110 Auditorio
Thu 16.01.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 21.01.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
P2_D436 Tietoliikennelaboratorio
Thu 23.01.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 28.01.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
P2_D436 Tietoliikennelaboratorio
Thu 30.01.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 04.02.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online (KYHA)
Thu 06.02.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 11.02.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
P2_D436 Tietoliikennelaboratorio
Thu 13.02.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 18.02.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
P2_D436 Tietoliikennelaboratorio
Thu 20.02.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 04.03.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
P2_D436 Tietoliikennelaboratorio
Wed 05.03.2025 time 12:00 - 13:30
(1 h 30 min)
Software Exploitation TTC6520-3004
Online
Thu 06.03.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 11.03.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Wed 12.03.2025 time 12:00 - 13:30
(1 h 30 min)
Software Exploitation TTC6520-3004
Online
Thu 13.03.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 18.03.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Wed 19.03.2025 time 12:00 - 13:30
(1 h 30 min)
Software Exploitation TTC6520-3004
Online
Thu 20.03.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 25.03.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Wed 26.03.2025 time 12:00 - 13:30
(1 h 30 min)
Software Exploitation TTC6520-3004
Online
Thu 27.03.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 01.04.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Wed 02.04.2025 time 12:00 - 13:30
(1 h 30 min)
Software Exploitation TTC6520-3004
Online
Thu 03.04.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 08.04.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Thu 10.04.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 15.04.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Thu 17.04.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 22.04.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Thu 24.04.2025 time 13:30 - 16:00
(2 h 30 min)
Workshop
Online
Tue 29.04.2025 time 14:00 - 16:30
(2 h 30 min)
Workshop
Verkko/Online
Changes to reservations may be possible.

Evaluation scale

0-5

Content scheduling

We start by going through whole course theory, after all theory parts, we'll continue with hands-on assignments for the rest of the course.

Objective

The student knows the most common application vulnerabilities and how they affect new and existing applications. The student is also able to find, exploit and fix common application vulnerabilities. The student is also familiar with safety mechanisms built into modern operating systems to make exploitation more difficult.

Competences
EUR-ACE: Knowledge and understanding 
EUR-ACE: Engineering practice 

Content

The course will cover most common application vulnerabilities, what causes them, how they are exploited and how to fix or mitigate them. Basic knowledge of C or C++ and data structures and algorithms is required. Knowledge of one scripting language (e.g. Python) is recommended.

Materials

Materials in the e-learning environment and a book: Hacking : the art of exploitation 2nd edition

Teaching methods

- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks
- book

Exam schedules

No exam, assessment is based on assignments.

Completion alternatives

The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.

Student workload

One credit (1 Cr) corresponds to an average of 27 hours of work.

- lectures 10 h
- reading assignments 15 h
- independent study 60 h
- assignment solving 40 h
- assignment reporting 10 h
Total 135 h

Assessment criteria, satisfactory (1)

Satisfactory (2): The student understands the most basic topics discussed during the course, however, struggles to utilize this knowledge.
Sufficient (1): The student is familiar with the basic topics discussed during the course. He is able to solve problems related to the topics only in the simplest of cases.
Fail 0: The student does not meet the minimum criteria set for the course.

Assessment criteria, good (3)

Very good (4): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most common cases.
Good (3): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most basic cases.

Assessment criteria, excellent (5)

Excellent (5): The student understands all topics discussed during the course and is able to use them in an innovative manner even in challenging cases.

Qualifications

Basics in programming, Data structures and algorithms

Further information

Points from the quizzes and from the labs. No exam

Go back to top of page