0% found this document useful (0 votes)
78 views2 pages

2ceit6pe7 Ethical Hacking

This document outlines an Ethical Hacking course offered at Ganpat University. The course aims to explore ethical hacking basics, cryptography, reconnaissance, scanning techniques, hacking networks, wireless hacking and penetration testing. It is a 4 credit course with 3 hours of lectures and 2 hours of practical sessions per week. The course covers topics like footprinting, vulnerability assessment, sniffing techniques, social engineering, SQL injection and cryptography. Students will learn how to scan, test and secure systems through interactive simulations. Upon completing the course, students will be able to apply security knowledge, understand perimeter defenses, escalate privileges, analyze malicious activities and secure networks from intruders.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views2 pages

2ceit6pe7 Ethical Hacking

This document outlines an Ethical Hacking course offered at Ganpat University. The course aims to explore ethical hacking basics, cryptography, reconnaissance, scanning techniques, hacking networks, wireless hacking and penetration testing. It is a 4 credit course with 3 hours of lectures and 2 hours of practical sessions per week. The course covers topics like footprinting, vulnerability assessment, sniffing techniques, social engineering, SQL injection and cryptography. Students will learn how to scan, test and secure systems through interactive simulations. Upon completing the course, students will be able to apply security knowledge, understand perimeter defenses, escalate privileges, analyze malicious activities and secure networks from intruders.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

GANPAT UNIVERSITY

FACULTY OF ENGINEERING & TECHNOLOGY


Programme Bachelor of Technology Branch/Spec. Computer Engineering/Information
Technology
Semester VI Version 2.0.0.0
Effective from Academic Year 2020-21 Effective for the batch Admitted in July 2018
Subject code 2CEIT6PE7 Subject Name Ethical Hacking
Teaching scheme Examination scheme (Marks)
(Per week) Lecture Practical Total CE SEE Total
(DT) (Lab.)
L TU P TW
Credit 3 0 1 - 4 Theory 40 60 100
Hours 3 0 2 - 5 Practical 30 20 50
Pre-requisites:
Programming and fundamentals of Computer networks
Objectives of the course:
1. Explore ethical hacking basics
2. Explore cryptography
3. Investigate reconnaissance: Information gathering for the ethical hacker
4. Explore scanning and enumeration
5. Explore hacking through the network: Sniffers and evasion
6. Explore low tech hacking techniques
7. Explore wireless network hacking
8. Perform penetration testing
Theory syllabus
Unit Content Hrs
Introduction:
1 Introduction to Ethical Hacking and Essential Terminologies- Threat, Attack, Vulnerabilities, 2
Target of Evaluation, Exploit, Phases involved in hacking
Footprinting & Reconnaissance:
2 Introduction to Footprinting, Footprinting methodology, Footprinting Tools, Footprinting 3
Countermeasures, Footprinting Penetration Testing
Scanning & Enumeration:
3 Introduction to scanning concepts, Scanning Tools, Understanding port scanning techniques, 5
Scanning Pen testing, Enumeration concepts
Vulnerability Assessment & System-Hacking:
4 5
Vulnerability Assessment Concepts, Stages of System Hacking, Penetration Testing
Malwares Threats , Sniffing:
5 8
Sniffing Techniques, Sniffing Tools, Sniffing detection techniques and countermeasures
Social Engineering:
6 Social Engineering Concepts, Various techniques of Social Engineering, Denial of Service: 6
DoS/DDoS Concepts, Techniques of DoS/DDoS attacks
Session Hijacking:
7 Understanding Session Hijacking, Phases involved in Session Hijacking, Types of Session 7
Hijacking, and Session Hijacking Tools.
SQL Injection & Hacking Wireless Networks:
8 6
Introduction to 802.11, Wireless hacking methodology, Wireless hacking tools
Cryptography:
9 Understand different encryption algorithms, Cryptography tools, Understand the use of 3
Cryptography over the Internet through PKI, Email encryption
Practical content
Experiments/Practicals/Simulations would be carried out based on syllabus
Text Books
1 CEH Certified Ethical Hacker Study Guide by Ric Messier
Reference Books
1 Network Intrusion Alert:An Ethical Hacking Guide to Intrusion Detection by Ankit Fadia, Manu
Zacharia, Thomson Course Technology PTR
2 Gray Hat Hacking: The Ethical Hacker's Handbook by Shon Harris
3 Ethical Hacking, Thomas Mathew
4 Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray, and George
Kurtz, McGraw-Hill
ICT/MOOCs Reference
1 https://swayam.gov.in/nd1_noc19_cs68/preview
2 https://nptel.ac.in/courses/106/105/106105217/
Course Outcomes:
After successful completion of this course, student will be able to
1. Apply knowledge into an interactive environment where they are shown how to scan, test, hack and secure
system / network.
2. Apply in-depth knowledge and practical experience with the current essential security systems.
3. Understand how perimeter defences work and then be led into scanning and attacking own networks, no
real network is harmed.
4. Evaluate how intruders escalate privileges and what steps can be taken to secure a system.
5. Analyse malicious activities

You might also like