Software Exploitation (5 cr)
Code: TTC6520-3005
General information
- Enrollment
-
04.08.2025 - 21.08.2025
Registration for introductions has not started yet.
- Timing
-
25.08.2025 - 19.12.2025
The implementation has not yet started.
- Number of ECTS credits allocated
- 5 cr
- Local portion
- 5 cr
- Mode of delivery
- Face-to-face
- Unit
- School of Technology
- Campus
- Lutakko Campus
- Teaching languages
- English
- Seats
- 0 - 35
- Degree programmes
- Bachelor's Degree Programme in Information and Communications Technology
- Bachelor's Degree Programme in Information and Communications Technology
- Teachers
- Jenna Penttilä
- Groups
-
TTV23S2Tieto- ja viestintätekniikka (AMK)
-
TTV23S3Tieto- ja viestintätekniikka (AMK)
-
TTV23S5Tieto- ja viestintätekniikka (AMK)
-
TTV23SMTieto- ja viestintätekniikka (AMK)
-
TIC23S1Bachelor's Degree Programme in Information and Communications Technology
-
TTV23S1Tieto- ja viestintätekniikka (AMK)
- Course
- TTC6520
Realization has 42 reservations. Total duration of reservations is 110 h 0 min.
Time | Topic | Location |
---|---|---|
Wed 27.08.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Wed 03.09.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Wed 10.09.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Mon 15.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 17.09.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 18.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 22.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Wed 24.09.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 25.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Mon 29.09.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 01.10.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 02.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 06.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 08.10.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 09.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 20.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 22.10.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 23.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 27.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 29.10.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 30.10.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 03.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Wed 05.11.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 06.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Mon 10.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 12.11.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 13.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 17.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 19.11.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 20.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 24.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 26.11.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 27.11.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 01.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 03.12.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 04.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Mon 08.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Wed 10.12.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 11.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
Verkko/Online
|
Mon 15.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Wed 17.12.2025 time 09:00 - 11:00 (2 h 0 min) |
Software Exploitation TTC6520-3005 |
Online
|
Thu 18.12.2025 time 12:00 - 15:00 (3 h 0 min) |
Ethical Hacking - Workshop |
P2_D426
Mediatekniikka
|
Evaluation scale
0-5
Content scheduling
We start by going through whole course theory, after all theory parts, we'll continue with hands-on assignments for the rest of the course.
Objective
The student knows the most common application vulnerabilities and how they affect new and existing applications. The student is also able to find, exploit and fix common application vulnerabilities. The student is also familiar with safety mechanisms built into modern operating systems to make exploitation more difficult.
Competences
EUR-ACE: Knowledge and understanding
EUR-ACE: Engineering practice
Content
The course will cover most common application vulnerabilities, what causes them, how they are exploited and how to fix or mitigate them. Basic knowledge of C or C++ and data structures and algorithms is required. Knowledge of one scripting language (e.g. Python) is recommended.
Materials
Materials in the e-learning environment and a book: Hacking : the art of exploitation 2nd edition
Teaching methods
- lectures
- independent study
- distance learning
- webinars
- exercises
- learning tasks
- book
Exam schedules
No exam, assessment is based on assignments.
Completion alternatives
The admission procedures are described in the degree rule and the study guide. The teacher of the course will give you more information on possible specific course practices.
Student workload
One credit (1 Cr) corresponds to an average of 27 hours of work.
- lectures 10 h
- reading assignments 15 h
- independent study 60 h
- assignment solving 40 h
- assignment reporting 10 h
Total 135 h
Assessment criteria, satisfactory (1)
Satisfactory (2): The student understands the most basic topics discussed during the course, however, struggles to utilize this knowledge.
Sufficient (1): The student is familiar with the basic topics discussed during the course. He is able to solve problems related to the topics only in the simplest of cases.
Fail 0: The student does not meet the minimum criteria set for the course.
Assessment criteria, good (3)
Very good (4): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most common cases.
Good (3): The student understands the most important topics discussed during the course and is able to utilize this knowledge in the most basic cases.
Assessment criteria, excellent (5)
Excellent (5): The student understands all topics discussed during the course and is able to use them in an innovative manner even in challenging cases.
Qualifications
Basics in programming, Data structures and algorithms
Further information
Points from the quizzes and from the labs. No exam