EU-iNSPIRE

Offensive Security

──

Offensive Security

This course develops advanced penetration testing and ethical hacking skills, equipping students to think and operate like adversaries in order to build stronger defences. From reconnaissance and OSINT through to exploitation, post-exploitation, lateral movement, and incident response, students gain hands-on experience using industry-standard tools and frameworks including Metasploit and Nmap in controlled lab environments. The course also covers the legal, regulatory, and ethical dimensions of offensive security practice, and introduces SOC operations and threat intelligence, preparing graduates for roles on both red and blue teams within complex organisational security environments.

Main Topics

The General Competences that students should have acquired include:

  • Search for, analysis and synthesis of data and information, with the use of the necessary technology
  • Working independently

 

Based on the above, upon completion of the course, students are expected to be able to:

  • Plan and execute full-scope penetration tests.
  • Exploit web, network and binary vulnerabilities using up-to-date offensive techniques and tools
  • Conduct Open-Source Intelligence (OSINT) and social-engineering engagements to emulate adversary reconnaissance.
  • Develop custom proof-of-concept exploits.
  • Produce clear, risk-prioritized remediation reports and deliver executive briefings.

.

After completing this course, students will:

  • have knowledge about the theoretical basis for security testing 
  • have information on the legal aspects of performing ethical hacking and to judge what is within and outside permitted activities 
  • understand Open Source Intelligence (OSINT) techniques 
  • understand network reconnaissance techniques 
  • have knowledge on service hacking techniques 
  • have knowledge on social engineering methods and tricks 
  • be able to perform practical penetration testing using up-to-date tools and techniques 
  • be able to evaluate the security status of systems and suggest solutions for removing security vulnerabilities 
  • be able to use publicly available resources for verifying the status of vulnerabilities and for applying patches 
  • have the ability to protect systems against modern cyber attacks 

Students will be able to:

  • Operate ethically within legal boundaries, defining rules of engagement and safeguards for live tests.
  • Advise organizations on threat-modelling outcomes and mitigation roadmaps.
  • Mentor security teams in red-/blue-team exercises to enhance organizational readiness.
  • Contribute to vulnerability-disclosure programmes and coordinate with CERTs.
  • Maintain continuous professional development in offensive techniques and counter-measures