| Week |
Subject |
Related Preparation |
| 1) |
Explanation of the course, its activity and its content. |
Lecture notes. |
| 2) |
Basic concepts. Pentest. Planning. Target. Risks. Reporting. |
Lecture notes. |
| 3) |
Basic Linux knowledge. |
Lecture notes. |
| 4) |
Basic Linux knowledge. |
Lecture notes. |
| 5) |
Basic network information. |
Lecture notes. |
| 6) |
Basic network information. |
Lecture notes. |
| 7) |
Vulnerability scanning. |
Lecture notes. |
| 8) |
Vulnerability scanning. |
Lecture notes |
| 9) |
Vulnerability scanning. |
Lecture notes. |
| 10) |
Database penetration tests. |
Lecture notes |
| 11) |
Database penetration tests. |
Lecture notes |
| 12) |
Database penetration tests. |
Lecture notes |
| 13) |
Web applications penetration tests. |
Lecture notes |
| 14) |
Web applications penetration tests |
Lecture notes |
| |
Program Outcomes |
Level of Contribution |
| 1) |
Uses basic Software Engineering knowledge and competencies. |
|
| 2) |
Applies the software development ability that is necessary for software engineering applications. |
|
| 3) |
Uses data structures and applies information about algorithm development. |
|
| 4) |
Develops system programs on operating systems. |
|
| 5) |
Defines computer organization, design and architectures. |
|
| 6) |
Creates the structure of computer networks and network security. |
|
| 7) |
Uses business intelligence, data mining and data analysis tools, applies techniques about them. |
|
| 8) |
Develops database applications and WEB based programs. |
|
| 9) |
Defines, analyzes, designs and manages information technologies projects. |
|
| 10) |
Uses and develops technology-based environments and tools in education. |
|
| 11) |
Detects, identifies and solves information technology needs of the business environment. |
|
| 12) |
Uses the capabilities of information technologies within the rules of professional responsibility and ethics. |
|