COMPX519-23B (HAM)
Malware Analysis and Penetration Testing
15 Points
Staff
Convenor(s)
Junaid Haseeb
4403
G.2.24
junaid.haseeb@waikato.ac.nz
|
Administrator(s)
Librarian(s)
You can contact staff by:
- Calling +64 7 838 4466 select option 1, then enter the extension.
-
Extensions starting with 4, 5, 9 or 3 can also be direct dialled:
- For extensions starting with 4: dial +64 7 838 extension.
- For extensions starting with 5: dial +64 7 858 extension.
- For extensions starting with 9: dial +64 7 837 extension.
- For extensions starting with 3: dial +64 7 2620 + the last 3 digits of the extension e.g. 3123 = +64 7 262 0123.
What this paper is about
In practical cyber security landscape two main complementary approaches have evolved; offensive security and defensive security. In this paper we will cover the defensive security topic of malware analysis to understand, analyse and detect malicious code. We will further cover offensive security techniques of SQL injection and cross site scripting in depth which are useful when performing penetration testing. Knowledge of such offensive and defensive security approaches is an essential part of software engineering too.
The learning outcomes for this paper are linked to Washington Accord graduate attributes WA1-WA11. Explanation of the graduate attributes can be found at: https://www.ieagreements.org/
How this paper will be taught
Required Readings
Learning Outcomes
Students who successfully complete the course should be able to:
Assessments
How you will be assessed
Assessments include Assignments, In-Class Test, and Weekly Quizzes. For the marks distribution, see the table below.
The internal assessment/exam ratio (as stated in the University Calendar) is 100:0. There is no final exam.