Ethical Hacking detailed syllabus for Computer Hardware (Computer Hardware) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the Computer Hardware students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.
For Computer Hardware 5th Sem scheme and its subjects, do visit Computer Hardware 5th Sem 2015 revision scheme. The detailed syllabus of ethical hacking is as follows.
Course General Outcome
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Specific outcomes:
MODULE – I: Vulnerabilities and attacks
- Understand ethical hacking concepts
- Explain the definition of ethical hacking
- List any five malicious software
- Explain any five malicious software
- Explain how to protect against malware attacks
- List any six network and system attacks
- Explain any six network and system attacks
MODULE – II: Hacking Techniques
- Understand the hacking techniques and tools
- Describe how web tools are used for footprinting
- Explain competitive intelligence
- Describe the use of other footprinting tools
- Explain the method of DNS zone transfer
- Explain the art of shoulder surfing
- Explain the art of dumpster diving
- Explain the art of piggy backing
- Describe various types of port scans
- Explain the use of port scanning tools such as Nmap, Unicornscan, Nessus and OpenVAS
- Explain how to conduct ping sweeps
- Describe about crafting IP packets
MODULE – III: Operating System Vulnerabilities
- Understand various vulnerabilities of Windows and Linux
- Explain Windows file system
- Explain Windows RPC
- Explain NetBIOS
- Explain Server Message Block
- Explain common Internet File System
- Explain null sessions
- Explain Web Services
- Explain Buffer overflows
- Explain Windows passwords and authentication
- Explain the tools for identifying Windows vulnerabilities
- Explain the best practices for hardening Windows systems
- Explain Linux OS vulnerabilities
- Explain the tools for identifying Linux vulnerabilities
- Explain the countermeasures against Linux attacks
MODULE – IV: Hacking Web Servers and Wireless Networks
- Understand the techniques to hack web servers and tools for it.
- Explain web server hacking
- Explain about web applications and their components
- Describe web application vulnerabilities and countermeasures
- Identify the tools used by web attackers and hackers
- Explain wireless hacking
- Describe the components of a wireless network
- Explain the working of wardriving
- Explain the tools for wireless hacking
- Explain the countermeasures against wireless attacks
MODULE – I: Vulnerabilities and attacks
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
MODULE – II: Hacking Techniques
Footprinting – Web tools are used for footprinting, Competitive intelligence, Other footprinting tools, DNS zone transfer – Social engineering – Shoulder surfing, Dumpster diving, Piggy backing – Port scanning – Types of port scans, Port scanning tools – Nmap, Unicornscan, Nessus and OpenVAS – Ping sweeps – Crafting IP packets
MODULE – III: Operating System Vulnerabilities
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
MODULE – IV: Hacking Web Servers and Wireless Networks
Web server hacking – Web applications and their components – Web application vulnerabilities and countermeasures – Tools for web attackers and hackers Wireless hacking – Wireless network technology – Components of a wireless network -Wardriving – Tools for wireless hacking – Countermeasures against wireless attacks
Text Books:
For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier..
Reference Books:
- Official Certified Ethical Hacker Review Guide – DeFino Steven, Kaufman Barry, Valenteen Nick-Cengage Learning–2009 Engebret-sonyngress
For detailed syllabus of all other subjects of Computer Hardware, 2015 revision curriculum do visit Computer Hardware 5th Sem subject syllabuses for 2015 revision.
To see the syllabus of all other branches of diploma 2015 revision curriculum do visit all branches of SITTTR diploma 2015 revision.