MCA

Ethical Hacking Syllabus for MCA 3rd Year 1st Sem R19 Regulation JNTUH (Professional Elective-II)

Ethical Hacking detailed Syllabus for Master of Computer Applications (MCA), R19 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The Syllabus PDF files can also be downloaded from the universities official website.

For all the other MCA 3rd Year 1st Sem Syllabus for R19 Regulation JNTUH, visit Master of Computer Applications 3rd Year 1st Sem R19 Scheme.

For all the (Professional Elective-II) subjects refer to Professional Elective-II Scheme. The detail syllabus for ethical hacking is as follows.

Course Objectives:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

  1. Gain the knowledge of the use and availability of tools to support an ethical hack
  2. Gain the knowledge of interpreting the results of a controlled attack
  3. Comprehend the dangers associated with penetration testing

Unit I

Introduction: Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations, Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration Information Security Models: Computer Security, Network Security, Service Security, Application Security, Security Architecture Information Security Program: The Process of Information Security, Component Parts of Information Security Program, Risk Analysis and Ethical Hacking

Unit II

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit III

Preparing for a Hack: Technical Preparation, Managing the Engagement Reconnaissance: Social Engineering, Physical Security, Internet Reconnaissance

Unit IV

Enumeration: Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration, Preparing for the Next Phase Exploitation: Intutive Testing, Evasion, Threads and Groups, Operating Systems, Password Crackers, RootKits, applications, Wardialing, Network, Services and Areas of Concern

Unit V

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Text Books:

  1. James S. Tiller, The Ethical Hack: A Framework for Business Value Penetration Testing, Auerbach Publications, CRC Press

Reference Books:

  1. EC-Council, Ethical Hacking and Countermeasures Attack Phases, Cengage Learning
  2. Michael Simpson, Kent Backman, James Corley, Hands-On Ethical Hacking and Network Defense, Cengage Learning

For detail Syllabus of all other subjects of 3rd Year 1st Sem Master of Computer Applications, visit MCA 3rd Year 1st Sem Syllabus Subjects.

For all MCA results, visit JNTUH MCA all years, and semester results from direct links.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.