Course Syllabus

Intrusion Attemtp is not a replacement for traditional education, it is rather meant to be a supplementary tool educators can use to support existing curriculum on the topics of attack & defense and adversary thinking, such as penetration testing and red teaming. An example of such a course is the joint course taught at the Norwegian University of Science and Technology (NTNU) called Incident Response, Ethical Hacking and Penetration Testing a.k.a. IMT3004.

The Ethical Hacking part of the IMT3004 course vision is to server a course that provides bachelor students with the technical and theoretical knowledge they need to start a carrier as competent junior service providers in the field of vulnerability assessment, penetration testing and red teaming. Consequently, the course should also server as a stepping stone for those interested in pursuing industry renowned certification such as CEH, OSCP and CPTE.

This is realized by teachings students how to utilize the skills and knowledge they have received during the first two years of their study program (IT-Operations and Information Security, a.k.a BITSEC), augmented of course with additional technical and theoretical knowledge (both offensive and defensive) taught at the IMT3004 course, to plan, emulate and evaluate intrusion attempts perform by malicious actors.
Intrusion Attempt has been developed with such type of courses in mind.

The table below highlights the course objectives of the Ethical Hacking part of the IMT3004 couirse that Intrusion Attempt tries to support:

Please note that the course is constantly under constant revision to make sure that the content is always relevant.

Assumed student knowledge:

…..

Unity 1 of the course provides students with an introductory course into the field…..

Table Plugin

Unity 2 covers topics related to reconnaissance…..

Table Plugin

Unity 3 covers topics related to Scanning, Fingerprinting and Enumeration…..

Table Plugin

Unity 4 covers topics related to vulnerability theory…..

Table Plugin

Course final project

The course is concluded with a work group project assignment where students are allowed to put into practice the most important concepts taught during the course by perform a penetration testing assignment for a fictive small startup….mention the forensic part as well