IT

IT611PE: Ethical Hacking IT Syllabus for B.Tech 3rd Year 2nd Sem R18 Regulation JNTUH (Professional Elective-III)

Ethical Hacking detailed Syllabus for Information Technology (IT), R18 regulation has been taken from the JNTUH official website and presented for the students affiliated to JNTUH course structure. For Course Code, Subject Names, Theory Lectures, Tutorial, Practical/Drawing, Credits, and other information do visit full semester subjects post given below. The Syllabus PDF files can also be downloaded from the universities official website.

For all the other IT 3rd Year 2nd Sem Syllabus for B.Tech R18 Regulation JNTUH, visit Information Technology 3rd Year 2nd Sem R18 Scheme.

For all the (Professional Elective-III) subjects refer to Professional Elective-III Scheme. The detail syllabus for ethical hacking is as follows.

Pre-requisite:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Objectives:

  1. The aim of the course is to introduce the methodologies and framework of ethical hacking for enhancing the security.
  2. The course includes-Impacts of Hacking; Types of Hackers; Information Security Models; Information Security Program; Business Perspective; Planning a Controlled Attack; Framework of Steps (Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation, Deliverable and Integration)

Course Outcomes:

  1. Gain the knowledge of the use and availability of tools to support an ethical hack
  2. Gain the knowledge of interpreting the results of a controlled attack
  3. Understand the role of politics, inherent and imposed limitations and metrics for planning of a test
  4. Comprehend the dangers associated with penetration testing

Unit I

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit II

The Business Perspective: Business Objectives, Security Policy, Previous Test Results, Business Challenges

Planning for a Controlled Attack: Inherent Limitations, Imposed Limitations, timing is Everything, Attack Type, Source Point, Required Knowledge, Multi-Phased Attacks, Teaming and Attack Structure, Engagement Planner, The Right Security Consultant, The Tester, Logistics, Intermediates, Law Enforcement

Unit III

Preparing for a Hack: Technical Preparation, Managing the Engagement

Reconnaissance: Social Engineering, Physical Security, Internet Reconnaissance

Unit IV

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit V

Deliverable: The Deliverable, The Document, Overal Structure, Aligning Findings, Presentation

Integration: Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident Management, Security Policy, Conclusion

Text Books:

  1. James S. Tiller, The Ethical Hack: A Framework for Business Value Penetration Testing, Auerbach Publications, CRC Press

Reference Book:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

For detail Syllabus of all other subjects of B.Tech 3rd Year 2nd Sem Information Technology, visit IT 3rd Year 2nd Sem Syllabus Subjects.

For all B.Tech results, visit JNTUH B.Tech all years, and semester results from direct links.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.