Cyber Security

CCS344: Ethical Hacking syllabus for Cyber Security 2021 regulation (Professional Elective-III)

Ethical Hacking detailed syllabus for Cyber Security (Cyber Security) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the Cyber Security students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Cyber Security 6th Sem scheme and its subjects, do visit Cyber Security 6th Sem 2021 regulation scheme. For Professional Elective-III scheme and its subjects refer to Cyber Security Professional Elective-III syllabus scheme. The detailed syllabus of ethical hacking is as follows.

Course Objectives:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit I

INTRODUCTION
Ethical Hacking Overview – Role of Security and Penetration Testers .- Penetration-Testing Methodologies- Laws of the Land – Overview of TCP/IP- The Application Layer – The Transport Layer – The Internet Layer – IP Addressing .- Network and Computer Attacks – Malware -Protecting Against Malware Attacks.- Intruder Attacks – Addressing Physical Security

Unit II

FOOT PRINTING, RECONNAISSANCE AND SCANNING NETWORKS
Footprinting Concepts – Footprinting through Search Engines, Web Services, Social Networking Sites, Website, Email – Competitive Intelligence – Footprinting through Social Engineering -Footprinting Tools – Network Scanning Concepts – Port-Scanning Tools – Scanning Techniques -Scanning Beyond IDS and Firewall

Unit III

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit IV

SYSTEM HACKING
Hacking Web Servers – Web Application Components- Vulnerabilities – Tools for Web Attackers and Security Testers Hacking Wireless Networks – Components of a Wireless Network -Wardriving- Wireless Hacking – Tools of the Trade –

Unit V

NETWORK PROTECTION SYSTEMS
Access Control Lists. – Cisco Adaptive Security Appliance Firewall – Configuration and Risk Analysis Tools for Firewalls and Routers – Intrusion Detection and Prevention Systems – NetworkBased and Host-Based IDSs and IPSs – Web Filtering – Security Incident Response Teams -Honeypots.

Practical Exercises

  1. Install Kali or Backtrack Linux / Metasploitable/ Windows XP
  2. Practice the basics of reconnaissance.
  3. Using FOCA / SearchDiggity tools, extract metadata and expanding the target list.
  4. Aggregates information from public databases using online free tools like Paterva’s Maltego.
  5. Information gathering using tools like Robtex.
  6. Scan the target using tools like Nessus.
  7. View and capture network traffic using Wireshark.
  8. Automate dig for vulnerabilities and match exploits using Armitage
    • FOCA :http://www.informatica64.com/foca.aspx.
    • Nessus :http://www.tenable.com/products/nessus.
    • Wireshark :http://www.wireshark.org.
    • Armitage :http://www.fastandeasyhacking.com/.
    • Kali or Backtrack Linux, Metasploitable, Windows XP

Course Outcomes:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Text Books:

  1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and Network Defense, Course Technology, Delmar Cengage Learning, 2010.
  2. The Basics of Hacking and Penetration Testing – Patrick Engebretson, SYNGRESS, Elsevier, 2013.
  3. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Dafydd Stuttard and Marcus Pinto, 2011.

Reference Books:

  1. Black Hat Python: Python Programming for Hackers and Pentesters, Justin Seitz , 2014.

For detailed syllabus of all the other subjects of Cyber Security 6th Sem, visit Cyber Security 6th Sem subject syllabuses for 2021 regulation.

For all Cyber Security results, visit Anna University Cyber Security all semester results direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*