BGT011 Advanced Penetration TestingIstinye UniversityDegree Programs Information Security TechnologyGeneral Information For StudentsDiploma SupplementErasmus Policy StatementNational Qualifications
Information Security Technology

Preview

Associate TR-NQF-HE: Level 5 QF-EHEA: Short Cycle EQF-LLL: Level 5

Course Introduction and Application Information

Course Code: BGT011
Course Name: Advanced Penetration Testing
Semester: Spring
Course Credits:
ECTS
3
Language of instruction: Turkish
Course Condition:
Does the Course Require Work Experience?: No
Type of course: Departmental Elective
Course Level:
Associate TR-NQF-HE:5. Master`s Degree QF-EHEA:Short Cycle EQF-LLL:5. Master`s Degree
Mode of Delivery:
Course Coordinator: Öğr. Gör. KEYVAN ARASTEH ABBASABAD
Course Lecturer(s): Keyvan Arasteh
Course Assistants:

Course Objective and Content

Course Objectives:
Course Content:

Learning Outcomes

The students who have succeeded in this course;
1) Advanced Network Discovery: Techniques for identifying vulnerabilities in target systems through advanced network discovery, including port scanning, service version detection, and network topology analysis. Attack Vectors and Methodology: Exploration of different attack vectors and advanced methodologies used to bypass security measures such as firewalls, intrusion detection systems (IDS), and others. Post-Exploitation Techniques: Strategies for maintaining access and reaching target data after a successful penetration test. Evasion and Concealment: Techniques to infiltrate systems and operate without detection, enhancing the difficulty of identifying the intrusion. Penetration Test Reporting and Ethics: Skills in reporting penetration test results ethically, including customer interaction and effective communication regarding recommendations and security measures.

Course Flow Plan

Week Subject Related Preparation
1) Introducttion to Javascript privilages and accessibilities
1) Web file malware sandbox & analysis
1) Wireless Networks infrastructure
2) hardware overview of wireless networks
3) Wireless Traffic Encryptions
4) Introduction to Wireshak And Packet Analysis
5) Introduction to ARP tables and local traffic routing
5) Monitor Mode (AirCrack-ng)
6) Cracking Wirelesss Packets
6) dnschef, DNS Poisioning
7) Setoolkit Overview And Usage

Sources

Course Notes / Textbooks:
References:

Course - Program Learning Outcome Relationship

Course Learning Outcomes

1

Program Outcomes
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Course - Learning Outcome Relationship

No Effect 1 Lowest 2 Average 3 Highest
       
Program Outcomes Level of Contribution
1) Has knowledge and skills about creating program algorithms.
2) Can install and manage software and hardware required for end user security.
3) Can follow current security products.
4) It can manage both software and people in the environment against cyber attack incidents.
5) Installs the basic software and hardware of the computer.
6) Installs and manages open source operating system and computer networks software.
7) It manages software, hardware and people in the environment in cyber attack incidents.
8) It creates and organizes the web page and database itself and can scan for vulnerabilities.
9) Creates, manages and organizes space on cloud platforms.
10) Firewall software also enables, manages and regulates the installation of hardware.
11) It solves the working logic of a device's software and makes the necessary arrangements to maximize its functions.
12) He/she has a good command of the professional, ethical, social and legal issues in his/her field.

Assessment & Grading

Semester Requirements Number of Activities Level of Contribution
total %
PERCENTAGE OF SEMESTER WORK % 0
PERCENTAGE OF FINAL WORK %
total %