The course focuses on a key area of cybersecurity: software and application security. It covers memory overflow techniques, fuzzing, and modern methods of vulnerability exploitation. Students learn to analyze source code, identify and evaluate weaknesses, and apply penetration testing techniques on Linux and Windows systems. The course also examines web application attacks such as XSS, CSRF, SQL Injection, and LFI, along with best practices for authentication security. Open-source tools are extensively used, and the course explores the application of artificial intelligence for automated vulnerability detection and security analysis of modern information systems.
Software and Application Security
Teaching Staff: Ntantogian Christoforos
Code: MO130
Course Type: Direction of CSC - Compulsory
Course Level: Undergraduate
Course Language: Greek
Semester: 6th
ECTS: 5
Teaching Units: 5
Lecture Hours: 4
Lab/Tutorial Hours: 2L
Total Hours: 6
Curricula: Revamped Curriculum in Informatics from 2025
Short Description:
Objectives - Learning Outcomes:
Upon successful completion of the course, the student will be able to:
- Analyze and assess source code to identify new vulnerabilities and exploit them to demonstrate attacks.
- Apply penetration testing methodologies and techniques to evaluate the security of an information system.
- Use a wide range of open-source tools commonly employed in the field of information system security.
- Perform security assessments of web applications.
- Recognize and understand the most common types of attacks targeting web applications.
- Identify current research trends and evaluate their potential impact on the field of cybersecurity in the coming years.
Syllabus:
Suggested Bibliography:
- “Ασφάλεια Πληροφοριών και Συστημάτων στον Κυβερνοχώρο”, Στέφανος Γκρίτζαλης Σωκράτης Κάτσικας Κωνσταντίνος Λαμπρινουδάκης, Εκδόσεις Νέων Τεχνολογιών, ISBN: 978-960-578-064-7, 2021
- “Computer Security: A Hands-on Approach 2nd Edition”, Wenliang Du, 978-1733003902, 2020
Teaching Methods:
Teaching Methods
- Lecture + Theory (seminars)
- Laboratory exercises (hands-on labs)
- Capture the Flag exercises (CTF)
New Technologies:
A set of tools and software stack will be used such as:
-Kali Linux
-Metasploit
-Burp Suite
-Python Scripts
-Virtualization (Virtualbox)
Evaluation Methods:
Ιndividual assignments
Back
Studies
Secretery Building (Building 3)
7 Tsirigoni Square
Corfu, 49100
tel:26610 87760 / 87761 / 87763
e-mail: cs@ionio.gr
e-mail: cs@ionio.gr