0% found this document useful (0 votes)
145 views

Ethical Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
145 views

Ethical Hacking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Second Year VALUE ADDED COURSE II Semester IV

ETHICAL HACKING
Code: (Theory) Credit: 5

COURSE OBJECTIVES:

To understand and analyse Information security threats and counter measures

 To perform security auditing & testing


 To understand issues relating to ethical hacking
 To study & employ network defense measures

UNIT - I ETHICAL HACKING OVERVIEW & VULNERABILITIES:

Understanding the importance of security-Concept of ethical hacking and


essential Terminologies Threat- Attack- Vulnerabilities- Target of Evaluation
Exploit. Phases involved in hacking.

UNIT – II FOOTPRINTING & PORT SCANNING:

Foot printing - Introduction to foot printing- Understanding the information


gathering methodology of the hackers-Tools used for the reconnaissance phase.
Port Scanning - Introduction- using port scanning tools- Ping sweeps Scripting
Enumeration-Introduction- Enumerating windows OS & Linux OS.

UNIT – III SYSTEM HACKING:

Aspect of remote password guessing- Role of eavesdropping -Various methods of


password cracking- Keystroke Loggers- Understanding Sniffers - Comprehending
Active and Passive Sniffing.

UNIT – IV HACKING WEB SERVICES:

Web application vulnerabilities- Application coding errors- SQL injection into


Back-end Databases- Cross-site scripting- cross-Site request forging
Authentication bypass- Web services and related flaws- Protective http headers

UNIT – V HACKING WIRELESS NETWORKS:

Introduction to 802.11-Role of WEP- Cracking WEP Keys- Sniffing Traffic Wireless


DOS attacks-WLAN Scanners-WLAN Sniffers-Hacking Tools-Securing Wireless
Networks.

REFERENCES:

1. Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt Ltd, 2010.
2. Michael T. Simpson, "Hands-on Ethical Hacking & Network Defense", Course
Technology, 2010
3. Patrick Engebretson, “The Basics of Hacking and Penetration Testing” Ethical
Hacking and Penetration Testing Made Easy, Syngress Media, Second Revised
Edition, 2013.
83
4. RajatKhare, "Network Security and Ethical Hacking", Luniver Press, 2006.
5. Ramachandran V, “Wireless Penetration Testing Beginner’s Guide “ 3rd ed.
Packt Publishing, 2011.
6. Thomas Mathew, "Ethical Hacking", OSB publishers, 2003.
7. https://www.elsevier.com/books/
8. https://www.elsevier.com/books/cyber-security-awareness-forlawyers
9. https://books.google.co.in/books
10. https://www.coursera.org/specializations/ethical-hacking
11. https://nptel.ac.in/courses

COURSE OUTCOMES:

Upon completion of the course, the student will be able to:

 Understand and identify the vulnerabilities/threats/attacks.


 Understand penetration & security testing.
 Use safe penetration techniques on the World Wide Web.
 Design a computer against a variety of security attacks using various tools.
 Become a professional ethical hacker.

*****

84

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy