Ethical Hacking detailed Syllabus for Master of Computer Applications (MCA), R19 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The Syllabus PDF files can also be downloaded from the universities official website.
For all the other MCA 3rd Year 1st Sem Syllabus for R19 Regulation JNTUH, visit Master of Computer Applications 3rd Year 1st Sem R19 Scheme.
For all the (Professional Elective-II) subjects refer to Professional Elective-II Scheme. The detail syllabus for ethical hacking is as follows.
Course Objectives:
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Course Outcomes:
- Gain the knowledge of the use and availability of tools to support an ethical hack
- Gain the knowledge of interpreting the results of a controlled attack
- Comprehend the dangers associated with penetration testing
Unit I
Introduction: Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations, Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration Information Security Models: Computer Security, Network Security, Service Security, Application Security, Security Architecture Information Security Program: The Process of Information Security, Component Parts of Information Security Program, Risk Analysis and Ethical Hacking
Unit II
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Unit III
Preparing for a Hack: Technical Preparation, Managing the Engagement Reconnaissance: Social Engineering, Physical Security, Internet Reconnaissance
Unit IV
Enumeration: Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration, Preparing for the Next Phase Exploitation: Intutive Testing, Evasion, Threads and Groups, Operating Systems, Password Crackers, RootKits, applications, Wardialing, Network, Services and Areas of Concern
Unit V
For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
.
Text Books:
- James S. Tiller, The Ethical Hack: A Framework for Business Value Penetration Testing, Auerbach Publications, CRC Press
Reference Books:
- EC-Council, Ethical Hacking and Countermeasures Attack Phases, Cengage Learning
- Michael Simpson, Kent Backman, James Corley, Hands-On Ethical Hacking and Network Defense, Cengage Learning
For detail Syllabus of all other subjects of 3rd Year 1st Sem Master of Computer Applications, visit MCA 3rd Year 1st Sem Syllabus Subjects.
For all MCA results, visit JNTUH MCA all years, and semester results from direct links.