This mandatory course aims to have students learn and practice the techniques used to carry out an ethical hacking process. Specifically, the objectives to be achieved are the following:
- Understand the penetration testing lifecycle: reconnaissance, exploitation, concealment, and persistence.
- Develop practical skills to identify, exploit, and mitigate vulnerabilities in systems and applications.
- Know in depth the techniques and methodologies used by attackers to compromise systems and networks.
- Design and execute penetration tests and Red Team exercises to evaluate system security.
- Understand and apply open-source methods, techniques, and tools for cyberattack investigation to a specific facility.
- Learn techniques for attack concealment and system persistence.
- Understand current trends in cyberattack techniques and the lessons learned in real-world cases.
- Explain at least one way to penetrate a system whose vulnerabilities have been detected, justifying the vulnerabilities found and the detailed procedure to be followed for the intrusion through reasoned reports.
- Explain other attack techniques on a system that is not susceptible to direct intrusion.