{"id":33265,"date":"2021-05-21T08:12:44","date_gmt":"2021-05-21T08:12:44","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/it5043-ethical-hacking-syllabus-for-it-8th-sem-2019-regulation-anna-university-professional-elective-vi\/"},"modified":"2021-05-21T08:12:44","modified_gmt":"2021-05-21T08:12:44","slug":"it5043-ethical-hacking-syllabus-for-it-8th-sem-2019-regulation-anna-university-professional-elective-vi","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/it5043-ethical-hacking-syllabus-for-it-8th-sem-2019-regulation-anna-university-professional-elective-vi\/","title":{"rendered":"IT5043: Ethical Hacking Syllabus for IT 8th Sem 2019 Regulation Anna University (Professional Elective-VI)"},"content":{"rendered":"<p align=\"justify\">Ethical Hacking detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Information Technology 8th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/information-technology-it-syllabus-for-8th-sem-2019-regulation-anna-university\">IT 8th Sem 2019 regulation scheme<\/a>. For Professional Elective-VI scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/professional-elective-vi-syllabus-for-it-8th-sem-2019-regulation-anna-university\">IT Professional Elective-VI syllabus scheme<\/a>. The detailed syllabus of ethical hacking is as follows. <\/p>\n<p>  <title>Ethical Hacking<\/title><\/p>\n<h4>Course Objective:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit I<\/h4>\n<p align=\"justify\">\n  <strong>Introduction To Hacking<\/strong><br \/>\n  Introduction to Hacking &#8211; Important Terminologies &#8211; Penetration Test &#8211; Vulnerability Assessments versus Penetration Test &#8211; Pre-Engagement &#8211; Rules of Engagement -Penetration Testing Methodologies &#8211; OSSTMM &#8211; NIST &#8211; OWASP &#8211; Categories of Penetration Test &#8211; Types of Penetration Tests &#8211; Vulnerability Assessment Summary -Reports.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>In-class activity to understand the penetration testing methodologies.<\/li>\n<li>Practical &#8211; Use security tools in Kali Linux to assess the vulnerabilities.<\/li>\n<li>Prepare Vulnerability Assessment summary reports.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Assignment on categories of penetration testing and vulnerability summary reports .<\/li>\n<li>Quiz on penetration testing methodologies, OSSTMM and OWASP.<\/li>\n<\/ul>\n<h4>Unit II<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit III<\/h4>\n<p align=\"justify\">\n  <strong>Network Attacks<\/strong><br \/>\n  Vulnerability Data Resources &#8211; Exploit Databases &#8211; Network Sniffing &#8211; Types of Sniffing -Promiscuous versus Nonpromiscuous Mode &#8211; MITM Attacks &#8211; ARP Attacks &#8211; Denial of Service Attacks -Hijacking Session with MITM Attack &#8211; SSL Strip: Stripping HTTPS Traffic -DNS Spoofing &#8211; ARP Spoofing Attack Manipulating the DNS Records &#8211; DHCP Spoofing -Remote Exploitation &#8211; Attacking Network Remote Services &#8211; Overview of Brute Force Attacks &#8211; Traditional Brute Force &#8211; Attacking SMTP &#8211; Attacking SQL Servers &#8211; Testing for Weak Authentication.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>Familiarizing with different types of attacks such as sniffing, spoofing etc.<\/li>\n<li>Demonstrating the MITM attack using ARP Poisoning using Kali Linux.<\/li>\n<li>Teaching with case studies: SSL Stripping, SQL Injection, Brute Force attacks.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Assignment on denial of service (DoS) attack and hijacking session with MITM attack.<\/li>\n<p>    Quizzes on SSL stripping, ARP spoofing and weak authentication.\n  <\/ul>\n<\/p>\n<h4>Unit IV<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit V<\/h4>\n<p align=\"justify\">\n  <strong>Wireless and Web Hacking<\/strong><br \/>\n  Wireless Hacking &#8211; Introducing Aircrack- Cracking the WEP &#8211; Cracking a WPA\/WPA2 Wireless Network Using Aircrack-ng &#8211; Evil Twin Attack &#8211; Causing Denial of Service on the Original AP &#8211; Web Hacking &#8211; Attacking the Authentication &#8211; Brute Force and Dictionary Attacks &#8211; Types of Authentication &#8211; Log-In Protection Mechanisms &#8211; Captcha Validation Flaw &#8211; Captcha RESET Flaw &#8211; Manipulating User-Agents to Bypass Captcha and Other Protection &#8211; Authentication Bypass Attacks &#8211; Testing for the Vulnerability &#8211; Automating It with Burp Suite &#8211; Session Attacks &#8211; SQL Injection Attacks &#8211; XSS (Cross-Site Scripting) -Types of Cross-Site Scripting &#8211; Cross-Site Request Forgery (CSRF) &#8211; SSRF Attacks.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>Cracking the WEP and WPA\/WPA2 passphrase using Cracking tool in Kali Linux.<\/li>\n<li>Design a web application with different authentication mechanism.<\/li>\n<li>Understand the protection mechanism to prevent against various server attacks.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Assignment on evil twin attack and denial of service attack on access point in WLAN.<\/li>\n<li>Quizzes on types of authentication and vulnerabilities in a web application.<\/li>\n<\/ul>\n<h4>Course Outcome:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Text Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Rafay Baloch, &#8220;Ethical Hacking and Penetration Testing Guide&#8221;, CRC Press, 2014.<\/li>\n<\/ol>\n<h4>References:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Kevin Beaver, &#8220;Ethical Hacking for Dummies&#8221;, Sixth Edition, Wiley, 2018.<\/li>\n<li>Jon Erickson , &#8220;Hacking: The Art of Exploitation&#8221;, Second Edition, Rogunix, 2007.<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Information Technology 8th Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/it+8th-sem\">IT 8th Sem subject syllabuses for 2019 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Information Technology results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University IT all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For course code, [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[72],"tags":[],"class_list":["post-33265","post","type-post","status-publish","format-standard","hentry","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=33265"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33265\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=33265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=33265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=33265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}