This course covers areas of legal and ethical implications of ethical hacking.
It also introduces detection and exploitation of vulnerabilities in IT infrastructure, including different reconnaissance techniques. The course provides in-depth understanding of the penetration testing phases, various attack vectors, and preventative countermeasures.
The course encompasses that the student should learn to understand and discover weaknesses and vulnerabilities in information systems, perform the attacks, check the strength of existing security controls, etc.
In contrast to learning how to do manual testing, in this course you will learn how to generate tests automatically in the sense that test creation satisfying a given test goal or given requirement is performed automatically.
This course provides an understanding of automating software testing using program analysis with the goal of intelligently and algorithmically creating tests. The course covers search-based test generation, combinatorial and random testing while highlighting the challenges associated with the use of automatic test generation.
This course provides a fundamental knowledge of IoT, targeting physical devices, communication and computation infrastructure. The course gives theoretical knowledge as well as hands-on experiences to build an IoT application.
This course deals with model-based testing, a class of technologies shown to be effective and efficient in assessing the quality and correctness of large software systems. Throughout the course the participants will learn how to design and use model-based testing tools, how to create realistic models and how to use these models to automate the testing process in their organisation.
Modern web applications can often be described in terms of cooperation and sharing, both on the level of the users of the application and on the level of the application and the service providers. This course covers the most prevalent security challenges of web applications, from a theoretical and practical perspective.
This course provides an understanding of the fundamental problems in software testing, as well as solid foundation in the practical methods and tools for a systematic state-of-the-art approach to testing of software.
This course is a guide to the cybersecurity issues arising throughout the entire development process. We consider the development from the security perspective from the beginning stage until the final release and beyond. No matter whether you are a developer, engineer, or a top-level manager, this course will benefit you.
You will learn some useful hands-on approaches for trade-off analysis, requirements prioritization methods, risk assessment approaches, and other security aspects at all stages of development.