Course Title: Ethical Hacking
Semester IV Teaching Scheme Evaluation Scheme
Theory Practical
Term Even L T P Credit TAE CAE ESE INT EXT
Course Category PMjCC 3 -- -- 3 20 20 60 -- --
Course Code BITT244
Teaching Mode Offline 3 Hrs 3 100
Duration of ESE 3 Hrs 100
Course Objectives 1. Learn the foundational principles and legal aspects of
ethical hacking.
2. Master techniques for identifying and assessing
vulnerabilities in systems and networks
3. Gain proficiency in using various hacking tools and
methodologies for penetration testing.
4. Understand network security protocols and best
practices.
5. Learn to secure web applications by identifying and
mitigating common vulnerabilities.
Course Outcomes Upon successful completion of this course, student shall be able to:
CO1: Demonstrate a thorough understanding of ethical
hacking principles and legal considerations.
CO2: Identify and assess vulnerabilities in systems and
networks.
CO3: Use hacking tools and techniques for penetration
testing.
CO4: Secure web applications by mitigating vulnerabilities.
CO5: Conduct comprehensive penetration tests and provide
detailed security assessments.
Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcomes PO P PO PO P PO PO PO P PO PO PO PSO PSO PSO
1 O 3 4 O 6 7 8 O 10 11 12 1 2 3
2 5 9
CO1 1 2 3
CO2 2 1 3
CO3 3 2 2
CO4 1 1 3
CO5 2 1 3
Course Contents:
Unit Contents CO Hours
I Introduction to Ethical Hacking- Defining and importance, ethical and CO1 9
legal issues, types of hackers, Security principles, threats and attack Hours
vectors
II Footprinting Technology:Passive and active footprinting, Tools CO3 9
WHOIS, Nslookup, the Harvester, Nmap, Maltego, Social Hours
engineering basics.
Scanning and Enumeration: Types of Scans: port,
network,vulnerability, Tools:enum4linux, SNMPwalk.
III Gaining Access: Password craking- John the Ripper, Hashcat, CO4 9
Exploiting vulnerabilities: Metasploit. Hours
Maintaining Access: Backdoors and rootkits, Privilege
escalation techniques.
Covering Tracks: Clearinglogs, hiding tools.
IV Types of Malware: Viruses, worms, Trojans, Ransomware, CO5 9
Malware Analysis: Static and dynamic analysis, Tools- IDA Pro, Hours
OllyDbg.
V Network Sniffing: Packet sniffing- Wireshark, tcpdump,MITM attacks.
Social Engineering : Techniques: phishing, pretexting, Tools: SET(Social
Engineering Toolkit)
Text Books 1 Hacking: The Art of Exploitation” by Jon Erickson: Covers
the fundamentals of hacking with practical examples.
2 The Web Application Hacker's Handbook” by Dafydd
Stuttard and Marcus Pinto: In-depth guide to web application
security.
Reference Books 1 Metasploit: The Penetration Tester's
Guide” by David Kennedy, Jim
O'Gorman, Devon Kearns, and Mati
Aharoni: Comprehensive resource on
using Metasploit for penetration testing.
2 CEH v11: Certified Ethical Hacker Study Guide” by Ric
Messier: Study guide for the CEH certification.
1. Ethical Hacking: A Hands-On Introduction to Breaking in,
Online Reference
By Daniel G. Graham