IT

CCS344: Ethical Hacking syllabus for IT 2021 regulation (Professional Elective-IV)

Ethical Hacking detailed syllabus for Information Technology (IT) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Information Technology 6th Sem scheme and its subjects, do visit IT 6th Sem 2021 regulation scheme. For Professional Elective-IV scheme and its subjects refer to IT Professional Elective-IV syllabus scheme. The detailed syllabus of ethical hacking is as follows.

Ethical Hacking

Course Objectives:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit I

INTRODUCTION 6 Ethical Hacking Overview – Role of Security and Penetration Testers .- Penetration-Testing Methodologies- Laws of the Land – Overview of TCP/IP- The Application Layer – The Transport Layer – The Internet Layer – IP Addressing .- Network and Computer Attacks – Malware – Protecting Against Malware Attacks.- Intruder Attacks – Addressing Physical Security

Unit II

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit III

ENUMERATION AND VULNERABILITY ANALYSIS 6 Enumeration Concepts – NetBIOS Enumeration – SNMP, LDAP, NTP, SMTP and DNS Enumeration – Vulnerability Assessment Concepts – Desktop and Server OS Vulnerabilities -Windows OS Vulnerabilities – Tools for Identifying Vulnerabilities in Windows- Linux OS Vulnerabilities- Vulnerabilities of Embedded Oss

Unit IV

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit V

NETWORK PROTECTION SYSTEMS 6 Access Control Lists. – Cisco Adaptive Security Appliance Firewall – Configuration and Risk Analysis Tools for Firewalls and Routers – Intrusion Detection and Prevention Systems – Network-Based and Host-Based IDSs and IPSs – Web Filtering – Security Incident Response Teams – Honeypots.

Practical Exercises:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Course Outcomes:

At the end of this course, the students will be able:

  1. To express knowledge on basics of computer based vulnerabilities
  2. To gain understanding on different foot printing, reconnaissance and scanning methods.
  3. To demonstrate the enumeration and vulnerability analysis methods
  4. To gain knowledge on hacking options available in Web and wireless applications.
  5. To acquire knowledge on the options for network protection.
  6. To use tools to perform ethical hacking to expose the vulnerabilities.

Text Books:

  1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and Network Defense, Course Technology, Delmar Cengage Learning, 2010.
  2. The Basics of Hacking and Penetration Testing – Patrick Engebretson, SYNGRESS, Elsevier, 2013.
  3. The Web Application Hackers Handbook: Finding and Exploiting Security Flaws, Dafydd Stuttard and Marcus Pinto, 2011.

Reference Books:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

For detailed syllabus of all the other subjects of Information Technology 6th Sem, visit IT 6th Sem subject syllabuses for 2021 regulation.

For all Information Technology results, visit Anna University IT all semester results direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*