5th Sem, Computer Hardware

5135: Ethical Hacking KL Diploma Syllabus for Computer Hardware 5th Sem 2015 Revision SITTTR

Ethical Hacking detailed syllabus for Computer Hardware (Computer Hardware) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the Computer Hardware students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Computer Hardware 5th Sem scheme and its subjects, do visit Computer Hardware 5th Sem 2015 revision scheme. The detailed syllabus of ethical hacking is as follows.

Ethical Hacking

Course General Outcome

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Specific outcomes:

MODULE – I: Vulnerabilities and attacks

  1. Understand ethical hacking concepts
    1. Explain the definition of ethical hacking
    2. List any five malicious software
    3. Explain any five malicious software
    4. Explain how to protect against malware attacks
    5. List any six network and system attacks
    6. Explain any six network and system attacks

MODULE – II: Hacking Techniques

  1. Understand the hacking techniques and tools
    1. Describe how web tools are used for footprinting
    2. Explain competitive intelligence
    3. Describe the use of other footprinting tools
    4. Explain the method of DNS zone transfer
    5. Explain the art of shoulder surfing
    6. Explain the art of dumpster diving
    7. Explain the art of piggy backing
    8. Describe various types of port scans
    9. Explain the use of port scanning tools such as Nmap, Unicornscan, Nessus and OpenVAS
    10. Explain how to conduct ping sweeps
    11. Describe about crafting IP packets

MODULE – III: Operating System Vulnerabilities

  1. Understand various vulnerabilities of Windows and Linux
    1. Explain Windows file system
    2. Explain Windows RPC
    3. Explain NetBIOS
    4. Explain Server Message Block
    5. Explain common Internet File System
    6. Explain null sessions
    7. Explain Web Services
    8. Explain Buffer overflows
    9. Explain Windows passwords and authentication
    10. Explain the tools for identifying Windows vulnerabilities
    11. Explain the best practices for hardening Windows systems
    12. Explain Linux OS vulnerabilities
    13. Explain the tools for identifying Linux vulnerabilities
    14. Explain the countermeasures against Linux attacks

MODULE – IV: Hacking Web Servers and Wireless Networks

  1. Understand the techniques to hack web servers and tools for it.
    1. Explain web server hacking
    2. Explain about web applications and their components
    3. Describe web application vulnerabilities and countermeasures
    4. Identify the tools used by web attackers and hackers
    5. Explain wireless hacking
    6. Describe the components of a wireless network
    7. Explain the working of wardriving
    8. Explain the tools for wireless hacking
    9. Explain the countermeasures against wireless attacks

MODULE – I: Vulnerabilities and attacks

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

MODULE – II: Hacking Techniques

Footprinting – Web tools are used for footprinting, Competitive intelligence, Other footprinting tools, DNS zone transfer – Social engineering – Shoulder surfing, Dumpster diving, Piggy backing – Port scanning – Types of port scans, Port scanning tools – Nmap, Unicornscan, Nessus and OpenVAS – Ping sweeps – Crafting IP packets

MODULE – III: Operating System Vulnerabilities

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

MODULE – IV: Hacking Web Servers and Wireless Networks

Web server hacking – Web applications and their components – Web application vulnerabilities and countermeasures – Tools for web attackers and hackers Wireless hacking – Wireless network technology – Components of a wireless network -Wardriving – Tools for wireless hacking – Countermeasures against wireless attacks

Text Books:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Reference Books:

  1. Official Certified Ethical Hacker Review Guide – DeFino Steven, Kaufman Barry, Valenteen Nick-Cengage Learning–2009 Engebret-sonyngress

For detailed syllabus of all other subjects of Computer Hardware, 2015 revision curriculum do visit Computer Hardware 5th Sem subject syllabuses for 2015 revision.

To see the syllabus of all other branches of diploma 2015 revision curriculum do visit all branches of SITTTR diploma 2015 revision.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.