Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
287 views2 pages

Ethical Hacking

The document outlines the course structure for 'Ethical Hacking' offered in the IV semester, including objectives, outcomes, and content breakdown. It emphasizes foundational principles, vulnerability assessment, and proficiency in hacking tools. The course includes practical applications and references key textbooks and resources for further study.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
287 views2 pages

Ethical Hacking

The document outlines the course structure for 'Ethical Hacking' offered in the IV semester, including objectives, outcomes, and content breakdown. It emphasizes foundational principles, vulnerability assessment, and proficiency in hacking tools. The course includes practical applications and references key textbooks and resources for further study.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Title: Ethical Hacking

Semester IV Teaching Scheme Evaluation Scheme


Theory Practical
Term Even L T P Credit TAE CAE ESE INT EXT
Course Category PMjCC 3 -- -- 3 20 20 60 -- --
Course Code BITT244
Teaching Mode Offline 3 Hrs 3 100
Duration of ESE 3 Hrs 100

Course Objectives 1. Learn the foundational principles and legal aspects of


ethical hacking.
2. Master techniques for identifying and assessing
vulnerabilities in systems and networks
3. Gain proficiency in using various hacking tools and
methodologies for penetration testing.
4. Understand network security protocols and best
practices.
5. Learn to secure web applications by identifying and
mitigating common vulnerabilities.
Course Outcomes Upon successful completion of this course, student shall be able to:
CO1: Demonstrate a thorough understanding of ethical
hacking principles and legal considerations.

CO2: Identify and assess vulnerabilities in systems and


networks.

CO3: Use hacking tools and techniques for penetration


testing.

CO4: Secure web applications by mitigating vulnerabilities.


CO5: Conduct comprehensive penetration tests and provide
detailed security assessments.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO P PO PO P PO PO PO P PO PO PO PSO PSO PSO
1 O 3 4 O 6 7 8 O 10 11 12 1 2 3
2 5 9
CO1 1 2 3
CO2 2 1 3
CO3 3 2 2
CO4 1 1 3
CO5 2 1 3
Course Contents:

Unit Contents CO Hours


I Introduction to Ethical Hacking- Defining and importance, ethical and CO1 9
legal issues, types of hackers, Security principles, threats and attack Hours
vectors
II Footprinting Technology:Passive and active footprinting, Tools CO3 9
WHOIS, Nslookup, the Harvester, Nmap, Maltego, Social Hours
engineering basics.
Scanning and Enumeration: Types of Scans: port,
network,vulnerability, Tools:enum4linux, SNMPwalk.
III Gaining Access: Password craking- John the Ripper, Hashcat, CO4 9
Exploiting vulnerabilities: Metasploit. Hours
Maintaining Access: Backdoors and rootkits, Privilege
escalation techniques.
Covering Tracks: Clearinglogs, hiding tools.
IV Types of Malware: Viruses, worms, Trojans, Ransomware, CO5 9
Malware Analysis: Static and dynamic analysis, Tools- IDA Pro, Hours
OllyDbg.
V Network Sniffing: Packet sniffing- Wireshark, tcpdump,MITM attacks.
Social Engineering : Techniques: phishing, pretexting, Tools: SET(Social
Engineering Toolkit)

Text Books 1 Hacking: The Art of Exploitation” by Jon Erickson: Covers


the fundamentals of hacking with practical examples.
2 The Web Application Hacker's Handbook” by Dafydd
Stuttard and Marcus Pinto: In-depth guide to web application
security.
Reference Books 1 Metasploit: The Penetration Tester's
Guide” by David Kennedy, Jim
O'Gorman, Devon Kearns, and Mati
Aharoni: Comprehensive resource on
using Metasploit for penetration testing.
2 CEH v11: Certified Ethical Hacker Study Guide” by Ric
Messier: Study guide for the CEH certification.
1. Ethical Hacking: A Hands-On Introduction to Breaking in,
Online Reference
By Daniel G. Graham

You might also like