Skip to Main Content (Press Enter)

Logo UNIRC
  • ×
  • Home
  • Degrees
  • Courses
  • Jobs
  • People
  • Outputs
  • Organizations
  • Projects
  • Expertise & Skills

UNI-FIND
Logo UNIRC

|

UNI-FIND

unirc.it
  • ×
  • Home
  • Degrees
  • Courses
  • Jobs
  • People
  • Outputs
  • Organizations
  • Projects
  • Expertise & Skills
  1. Courses

1000932 - Tecnologie per la sicurezza informatica

courses
ID:
1000932
Duration (hours):
48
CFU:
6
SSD:
Data Processing Systems
Located in:
REGGIO DI CALABRIA
Url:
Course Details:
COMPUTER AND TELECOMMUNICATIONS SYSTEMS ENGINEERING/comune Year: 2
Year:
2025
  • Overview
  • Syllabus
  • Degrees
  • People
  • Other

Overview

Date/time interval

Secondo Ciclo Semestrale (23/02/2026 - 29/05/2026)

Syllabus

Course Objectives

The course in Cybersecurity Technologies aims to provide students with knowledge and skills to assess and improve the security of systems and applications, adopting a methodological and technical approach focused on risk analysis and the practical verification of vulnerabilities. By the end of the course, students will be able to plan and carry out security assessment and testing activities, interpret the results obtained, document them effectively, and propose appropriate countermeasures, applying these skills also in heterogeneous and modern technological contexts.


Course Prerequisites

knowledge of basic cybersecurity concepts, notions, and methodologies


Teaching Methods

The course is organized according to the following structure:

Lectures (24 hours): presentation of the theoretical concepts with the support of slides and the whiteboard. Some meetings with companies in the sector are also planned, aimed at interactive teaching activities on cybersecurity topics.

Classroom exercises (24 hours): hands-on computer-based exercises dedicated to penetration testing activities, through the use of specialist tools (Kali Linux, Metasploit, SQLmap, etc.).


Assessment Methods

The exam consists of the preparation and discussion of a project paper


and an oral exam.


The project paper is normally developed in groups. Groups normally consist of 2-3 students.


During the oral exam, the paper is discussed in order to highlight the contribution of each individual candidate,


and the concepts illustrated in class relating to the course program, covering a range of topics.


The final grade, considering both the written and oral exams, will be assigned according to the following criteria:


30 cum laude: complete, in-depth, and critical knowledge of the topics; excellent command of language; comprehensive and original interpretative skills; full ability to independently apply knowledge to solve the proposed problems.


28 - 30: complete and in-depth knowledge of the topics; excellent command of language; comprehensive and effective interpretative skills; ability to independently apply knowledge to solve the proposed problems.


24 - 27: good knowledge of the topics with a solid grasp of them; good command of language; correct and confident interpretative skills; good ability to correctly apply most of the acquired knowledge to solve the proposed problems.


20 - 23: adequate knowledge of the topics but limited mastery; satisfactory command of language; correct interpretative skills; more than sufficient ability to independently apply knowledge to solve the proposed problems.


18 - 19: basic knowledge of the main topics; basic understanding of technical language; sufficient interpretative skills; sufficient ability to apply the basic knowledge acquired.


<18 Insufficient: does not demonstrate an acceptable knowledge of the topics covered during the course.


Texts

Handouts and slides provided during the course. Cybersecurity standards and best practices.


Contents

Course Program

Phases of penetration testing (1 CFU)

Pre-engagement Interactions, Intelligence Gathering, Threat Modeling, Vulnerability Analysis, Exploitation, Post Exploitation, Reporting

Tools and instruments for penetration testing (1 CFU)

Network Mapping, Port and Service Enumeration, Traffic Analysis, Enumeration, tools for Vulnerability Analysis, international vulnerability repositories, 0-day exploits.

Attacks and vulnerabilities (1 CFU)

SQL injection and XSS, Buffer Overflow, DoS, Reverse Shell, Keylogger, Persistence, SMB vulnerabilities, Remote File Inclusion, Command Injection, Privilege Escalation

Incident Response and Active Security Tools (1 CFU)

Preparation, Detection / Analysis, Containment, Eradication, Recovery, Post-incident, Firewall, IDS, IPS, WAF, EDR

Other technologies (2 CFU)

Blockchain, Industrial IoT and penetration test, Malware analysis, Mobile security


Expected results

KNOWLEDGE AND UNDERSTANDING:

Upon successful completion of the exam, the student will know the main concepts, methods, tools, and operational techniques of cybersecurity, with particular reference to penetration testing, vulnerability analysis, cyber attacks, incident response, and the main active defense tools.


APPLYING KNOWLEDGE AND UNDERSTANDING:

Upon successful completion of the exam, the student will be able to apply, at a basic level, methodologies and tools for the security analysis of IT systems, the identification of vulnerabilities, and the evaluation of possible mitigation and response measures.


MAKING JUDGEMENTS:

To pass the exam, the student must be able to autonomously evaluate strategies, tools, and techniques to be adopted for a security assessment or for the analysis of attack and defense scenarios.


COMMUNICATION SKILLS:

The course and the exam help the student develop appropriate communication skills, enabling them to describe, using proper technical language, methodologies, tools, results, and the main issues in the field of cybersecurity.


LEARNING SKILLS:

Upon successful completion of the exam, the student will be able to independently learn new techniques, technologies, tools, and standards in the field of cybersecurity, and to apply them to new contexts and operational scenarios.


More information


Teams code: owmk814

Channel used to distribute teaching materials to students.



Degrees

Degrees

COMPUTER AND TELECOMMUNICATIONS SYSTEMS ENGINEERING 
Two-year Master's Degrees
2 years
No Results Found

People

People (2)

BUCCAFURRI Francesco
Gruppo 09/IINF-05 - SISTEMI DI ELABORAZIONE DELLE INFORMAZIONI
AREA MIN. 09 - Ingegneria industriale e dell'informazione
Settore IINF-05/A - Sistemi di elaborazione delle informazioni
Docenti di ruolo di Ia fascia
De Angelis Vincenzo
Teaching staff
No Results Found

Other

Main module

Technologies for Cybersecurity
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.3.5.1