|
Date
|
Subject
|
Resources
|
|
Week 1, Jan 14
|
Hacking Background. Course introduction, Core network and computing concepts (Networking, Command line utlities, File permissions, Programming languages, Web technologies)
|
|
|
Week 2, Jan 21
|
Cyber Ethics and Vulnerability Scoring.
|
|
|
Week 3, Jan 28
|
Hacking the Web.
|
|
|
Week 4, Feb 5
|
Hacking Networks.
|
|
|
Week 5, Feb 11
|
Hacking Systems.
|
-
File and OS permissions. Identity, access and privilege
-
Lecture 5: Phishing and Password hashing
-
Tutorial notes for the Passcode challenge
|
|
Week 6, Feb 18
|
Reading week. No class.
|
|
|
Week 7, Feb 25
|
Presentations. M.Eng (9069) Tool/Method case study. Research (9609) paper seminar (Day 1).
|
|
|
Week 8, Mar 4
|
Hacking Software. NO LECTURE (prof away at conference). See video lecture in OWL.
|
-
Program flow, stacks, buffer overflows, return-oriented programming, shellcode
-
Lecture 6: Buffer overflows
|
|
Week 9, Mar 11
|
Presentations. M.Eng (9069) Tool/Method case study. Research (9609) paper seminar (Day 2).
|
|
|
Week 10, Mar 18
|
Presentations. M.Eng (9069) Tool/Method case study. Research (9609) paper seminar (Day 3).
|
-
Yuxiang L., Xinyuan C., Yue W., Siyi L. - SQL injection attacks
-
Mingsen H., Beichen J., Yining S., Jiayang S. - Versatile Transferable Generator (VTG)
-
Jiacheng G., Chenhao G., Pengfeng Y., Jingyang W. - Tor/Onion Routing
-
Ashwini D., Gayathri N., Muhammad A. - Deepfakes
-
Jingyao W., Zihao S., Owen Z, Bohua L. - Social Engineering Toolkit
-
Paper seminar - Kareem G. - Volttack. Control IoT Devices by Manipulating Power Supply Voltage
-
Paper seminar - Saeed - Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard
|
|
Week 11, Mar 25
|
Presentations. M.Eng (9069) Tool/Method case study. Research (9609) paper seminar (Day 4).
|
|
|
Week 12, April 1
|
Final test
|
|
|
Week 13, April 8
|
No class. Time made avilable to work on CVE reports.
|
|