SALEIE logo that when clicked will open a new window to access the SALEIE home page.

Strategic ALignment of Electrical and Information Engineering in European Higher Education Institutions

European Union flag.



User guide



Click on the image to the left to select the project website section to go to.

Click on the images to the left and above to select the project website section to go to (Technical Challenge Areas, Student and Staff Support Hub or Governance) OR select the Student and Staff Support Hub below.

Technical Global Challenges Areas Student and Staff Support HUB Higher Education Policy Hub


Higher Education Technical Challenges Hub: Module Specification

ICT16M2 Systems for Detection and Prevention of Intrusion

pdf version of module specification

Download the module specification

pdf version of module specification








Module name:

Systems for Detection and Prevention of Intrusion

Scope and form:

Face to face

Duration (weeks; Hours/week):

15 weeks, 4h/week

Type of assessment:

1) Practical tasks in lab
During the semester students have to solve approximately 25 practical tasks is lab environment. Some of the tasks are simple and require only around 10 minutes to be accomplished while others are much more difficult. Most of the tasks require the students to make a security assessment on lab systems. Web based application is used to provide task descriptions, give hints to the students and track the results of submissions. Students can get 20 points in total for solving practical tasks and the result is calculated according to the following formula: (number of accomplished tasks / total number of tasks) * 20
2) Lab report
For each practical task the students are expected to take notes and provide a short description how the specific mission was accomplished: which tools were with which options were utilized, what specific requests were sent to the web applications, etc. Lab report can yield up to 20 points. The evaluation will be done based on for how many tasks a correct description has been provided and how many hints were used. Original and interesting solutions will give bonus.
3) Written exam
In order to pass the module, each student has to take a closed-book written exam. The exam comprises of 10 questions which the student has to accomplish during 2 hour time frame. The exam will cover both topics from the lectures and practical tasks. The exam can yield up to 60 points.
4) Homework assignment
During the first lecture a practical homework assignment (e.g. analysis of network packet capture) will be announced. Completed homework assignment due the deadline can yield up to 10 additional points.
5) Final evaluation
The final grade for each student is calculated from practical tasks, lab report, written exam and homework assignment.
The grades are assigned as follows:
More than 90 points:  grade 5 (excellent)
80 - 90 points: grade 4 (very good)
70 - 80 points: grade 3 (good)
60 - 70 points: grade 2 (satisfactory)
50 - 60 points: grade 1 (pass)
Below 50 points: grade 0 (failed)

Qualified Prerequisites:


General module objectives:

Main objective is to give a good technical overview of different attack methods and vulnerabilities the attackers are exploiting to compromise IT systems.
Give an overview and introduce different hacking attacks
Give an overview and introduce defense tools and strategies
Give an experience of individual research on one problem
Give an experience of defense of an attack
We will not use strong academic approach. Rather, we will focus on the current problems and practical issues of IT security.
There will be less lectures and more hands-on work and demo's on lab systems
The labs are built around Capture The Flag Exercises
We set up purposely vulnerable systems
Student's job is to identify vulnerabilities, gain access somehow and find the flag from the systems
First one gets the most points
Afterwards: securing and patching the systems

Topics and short description:

In general modules will be structured around typical attack phases. Going from Layer L2 to L7.
Introduction. Demo of the main phases of a penetration test
Reconnaissance and Scanning
Password and Brute-Force Attacks
Man-In The Middle Attacks
Attacks and Defence of Network Infrastructure
Web Application Security
Maintaining Access and Hiding Tracks

Learning outcomes:




>Hacking Attacks

Knowledge of different attacks

Attack scenarios. Plannning and executing

Defence strategies

Cyber security planning

Tools, methods and strategies of defense. Defence planning and execution. Experience of doing a written analyze and defending the results


Knowledge about cyber conflicts & crime

Understanding of the motivation of the cyberattacks. Incident handling

Recommended literature:

Sun Tzu. The Art of War.
Jon Erickson: Hacking. The Art of Exploitation. Second Edition
Dafydd Stuttard, Marcus Pinto: The Web Application Hacker’s Handbook. Second Edition