100% found this document useful (1 vote)
199 views6 pages

Introduction of Hacking

This document outlines the course materials and 14 modules covering topics such as footprinting, scanning, system hacking, social engineering, SQL injection, and penetration testing for an ethical hacking course for the 2008 batch of NMCSP students. Students will receive an identity card, courseware, and DVD with hacking toolkit. Modules cover techniques such as sniffing, trojans, denial of service attacks, and password cracking.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
199 views6 pages

Introduction of Hacking

This document outlines the course materials and 14 modules covering topics such as footprinting, scanning, system hacking, social engineering, SQL injection, and penetration testing for an ethical hacking course for the 2008 batch of NMCSP students. Students will receive an identity card, courseware, and DVD with hacking toolkit. Modules cover techniques such as sniffing, trojans, denial of service attacks, and password cracking.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 6

NMCSP

2008 Batch-I

Introduction
Course Materials

 Identity Card
 Student Courseware
 DVD Hacker Toolkit
 Course Evaluation
Course Outline

 Module I: Introduction to Ethical Hacking

 Module II: Footprinting

 Module III: Scanning

 Module IV: Enumeration

 Module V: System Hacking


Course Outline (contd.)

 Module VI: Trojans and Backdoors

 Module VII: Sniffers

 Module VIII: Denial of Service

 Module IX: Social Engineering

 Module X: Session Hijacking


Course Outline (contd.)

 Module XI: Hacking Web Servers

 Module XII: Web Application Vulnerabilities

 Module XIII: Web Based Password Cracking

Techniques

 Module XIV: SQL Injection


Course Outline (contd.)

 Module XV: Viruses

 Module XVI: Buffer Overflows

 Module XVII: Cryptography

 Module XVIII: Penetration Testing

You might also like