0% found this document useful (0 votes)
112 views2 pages

Vels university ethical hacking

Ethical hacking Syllabus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views2 pages

Vels university ethical hacking

Ethical hacking Syllabus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

GE ETHICAL HACKING 2 0 0 2

COURSE OBJECTIVE:
 To help students understand how ethical hacking is used as a method to prevent hacking.
 To make it possible for students to learn the process of identifying vulnerabilities and
exploits of the technological ecosystem comprising of various hardware, software,
network, OS and applications and identify suitable countermeasures.
 To facilitate students, appreciate the need for understanding non-technology aspects of
ethical hacking such as legal frameworks, documentation and report writing.

UNIT I INTRODUCTION TO ETHICAL HACKING 6

Hacking Methodology, Process of Malicious Hacking, and Foot printing and scanning: Foot
printing, scanning. Enumeration: Enumeration.

UNIT II TYES OF HACKING 6

System Hacking and Trojans: System Hacking, Trojans and Black Box Vs. White Box
Techniques.

UNIT III HACKING METHODOLOGY 6

Denial of Service, Sniffers, Session Hijacking and Hacking Web Servers: Session Hijacking,
Hacking Web Servers.

UNIT IV WEB APPLICATION 6

Web Application Vulnerabilities and Web Techniques Based Password Cracking: Web
Application Vulnerabilities, Web Based Password Cracking Techniques.

UNIT III WEB AND NETWORK HACKING 6

SQL Injection, Hacking Wireless Networking, Viruses, Worms and Physical Security: Viruses
and Worms, Physical Security. Linux Hacking: Linux Hacking. Evading IDS and Firewalls:
Evading IDS and Firewalls.

Total No of Hours: 30

61
COURSE OUTCOME
On Completion of this course, students can able to
CO1: Justify the need for meticulous documentation in writing reports for consumption of both
technical and management audiences

CO2: Differentiate the processes of vulnerability assessment and ethical hacking from
penetration testing.

CO3: Comprehend the importance of appropriate countermeasures for managing


vulnerabilities.

CO4: Explain the importance of ethical hacking in achieving the goals of information security.

CO5: Articulate the rationale for having an adequate legal framework for dealing with hacking
and ethical hacking.

TEXT BOOKS
1. Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition Paperback – 1 Jul 2017
by Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, McGraw Hill Education; 3 ed
(1 July 2017)

2. CEH v9: Certified Ethical Hacker Version 9 Study Guide by Sean-Philip Oriyano, Sybex;
Stg edition (17 June 2016)

3. Hacking for Beginners: Ultimate 7 Hour Hacking Course for Beginners. Learn Wireless
Hacking, Basic Security, Penetration Testing by Anthony Reynolds, CreateSpace
Independent Publishing Platform (10 April 2017)

4. An Ethical Guide To WI-FI Hacking and Security by Swaroop Yermalkar,


BecomeShakespeare.com; First edition (15 August 2014)

5. Hands-On Ethical Hacking and Network Defense by Michael T. Simpson | Kent


Backman | James Corley, Cengage India 1st edition (2016)

REFERENCE BOOKS
1. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing
Made Easy by Patrick Engebretson, Syngress; 2 edition (12 September 2013)

2. Hacking With Python: The Complete Guide to Ethical Hacking, Basic Security, Botnet
Attack, Python hacking and Penetration Testing Kindle Edition by John C. Smalls

62

You might also like