{"id":55649,"date":"2023-08-28T16:01:00","date_gmt":"2023-08-28T16:01:00","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/ccs344-ethical-hacking-syllabus-for-cce-2021-regulation-professional-elective-iv\/"},"modified":"2023-08-28T16:01:00","modified_gmt":"2023-08-28T16:01:00","slug":"ccs344-ethical-hacking-syllabus-for-cce-2021-regulation-professional-elective-iv","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/ccs344-ethical-hacking-syllabus-for-cce-2021-regulation-professional-elective-iv\/","title":{"rendered":"CCS344: Ethical Hacking syllabus for CCE 2021 regulation (Professional Elective-IV)"},"content":{"rendered":"<p align=\"justify\">Ethical Hacking detailed syllabus for Computer &amp; Communication Engineering (CCE) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the CCE students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Computer &amp; Communication Engineering 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cce-6th-sem-syllabus-2021-regulation\">CCE 6th Sem 2021 regulation scheme<\/a>. For Professional Elective-IV scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/professional-elective-iv-syllabus-for-cce-2021-regulation\">CCE Professional Elective-IV syllabus scheme<\/a>. The detailed syllabus of ethical hacking is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit I<\/h4>\n<p>INTRODUCTION<br \/>\nEthical Hacking Overview &#8211; Role of Security and Penetration Testers .- Penetration-Testing Methodologies- Laws of the Land &#8211; Overview of TCP\/IP- The Application Layer &#8211; The Transport Layer &#8211; The Internet Layer &#8211; IP Addressing .- Network and Computer Attacks &#8211; Malware &#8211; Protecting Against Malware Attacks.- Intruder Attacks &#8211; Addressing Physical Security\n<\/p>\n<p><h4>Unit II<\/h4>\n<p>FOOT PRINTING, RECONNAISSANCE AND SCANNING NETWORKS<br \/>\nFootprinting Concepts &#8211; Footprinting through Search Engines, Web Services, Social Networking Sites, Website, Email &#8211; Competitive Intelligence &#8211; Footprinting through Social Engineering -Footprinting Tools &#8211; Network Scanning Concepts &#8211; Port-Scanning Tools &#8211; Scanning Techniques &#8211;<br \/>\nScanning Beyond IDS and Firewall\n<\/p>\n<p><h4>Unit III<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit IV<\/h4>\n<p>SYSTEM HACKING<br \/>\nHacking Web Servers &#8211; Web Application Components- Vulnerabilities &#8211; Tools for Web Attackers and Security Testers Hacking Wireless Networks &#8211; Components of a Wireless Network &#8211; WardrivingWireless Hacking &#8211; Tools of the Trade &#8211;\n<\/p>\n<p><h4>Unit V<\/h4>\n<p>NETWORK PROTECTION SYSTEMS<br \/>\nAccess Control Lists. &#8211; Cisco Adaptive Security Appliance Firewall &#8211; Configuration and Risk Analysis Tools for Firewalls and Routers &#8211; Intrusion Detection and Prevention Systems &#8211; Network-Based and Host-Based IDSs and IPSs &#8211; Web Filtering &#8211; Security Incident Response Teams &#8211; Honeypots.\n<\/p>\n<p><h4>Practical Exercises<\/h4>\n<ol>\n<li>Install Kali or Backtrack Linux \/ Metasploitable\/ Windows XP<\/li>\n<li>Practice the basics of reconnaissance.<\/li>\n<li>Using FOCA \/ SearchDiggity tools, extract metadata and expanding the target list.<\/li>\n<li>Aggregates information from public databases using online free tools like Paterva\u2019s Maltego.<\/li>\n<li>Information gathering using tools like Robtex. |<\/li>\n<li>Scan the target using tools like Nessus.<\/li>\n<li>View and capture\tnetwork\ttraffic using Wireshark.<\/li>\n<li>Automate dig for\tvulnerabilities and match exploits using Armitage<\/li>\n<ul>\n<li>Foca\t:\thttp:\/\/www.informatica64.com\/foca.aspx.<\/li>\n<li>Nessus\t:\thttp:\/\/www.tenable.com\/products\/nessus.<\/li>\n<li>Wireshark:   http:\/\/www.wireshark.org.<\/li>\n<li>Armitage:    http:\/\/www.fastandeasyhacking.com\/.<\/li>\n<li>Kali or\tBacktrack\tLinux, Metasploitable, Windows\tXP<\/li>\n<\/ul>\n<\/ol>\n<p><h4>Course Outcomes:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and Network Defense, Course Technology, Delmar Cengage Learning, 2010.<\/li>\n<li>The Basics of Hacking and Penetration Testing &#8211; Patrick Engebretson, SYNGRESS, Elsevier, 2013.<\/li>\n<li>The Web Application Hacker\u2019s Handbook: Finding and Exploiting Security Flaws, Dafydd Stuttard and Marcus Pinto, 2011.<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>Black Hat Python: Python Programming for Hackers and Pentesters, Justin Seitz , 2014.<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Computer &amp; Communication Engineering 6th Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/cce+6th-sem\">CCE 6th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Computer &amp; Communication Engineering results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University CCE all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking detailed syllabus for Computer &amp; Communication Engineering (CCE) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the CCE students. For [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[145],"tags":[],"class_list":["post-55649","post","type-post","status-publish","format-standard","hentry","category-cce"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=55649"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55649\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=55649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=55649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=55649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}