CF

6158: Ethical Hacking Lab Syllabus for Cyber Forensics & Information Security 7th Sem 2021 Revision SITTTR (Professional Elective-IV)

Ethical Hacking Lab detailed syllabus for Cyber Forensics & Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber Forensics & Information Security (CF) students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Cyber Forensics & Information Security 7th Sem scheme and its subjects, do visit Cyber Forensics & Information Security (CF) 7th Sem 2021 regulation scheme. For Professional Elective-IV scheme and its subjects refer to Cyber Forensics & Information Security (CF) Professional Elective-IV syllabus scheme. The detailed syllabus of ethical hacking lab is as follows.

Course Objectives:

  • Impart hands-on training on various ethical hacking techniques.
  • Identify the security issues in a network environment and suggest the security measures to be practiced in an organization
  • Understand the ethics to be followed in a network community.

Course Outcomes:

On completion of the course, the student will be able to:

  1. Experiment with network commands and suggest counter measures for malwares.
  2. Make use of different tools to conduct foot printing and port scanning.
  3. Utilize tools for password hacking and software firewall.
  4. Construct a wireless network system with MAC filtering.

Module 1:

  1. Experiment with ipv4 configuration, gateway, DNS settings, ping command, netstat command, tracert command,
  2. Apply an antivirus software for protection against malware and also perform patching of OS
  3. Organize users in OS and set strong password for users

Module 2:

  1. Make use of whois, nslookup commands for foot printing.
  2. Experiment with port scanning using NMAP and practice various options.
  3. Make use of ping and ping sweep using NMAP

Module 3:

  1. Experiment password hacking methods like brute force, dictionary attack using tools
  2. Utilize wire shark and perform traffic monitoring.
  3. Construct a software firewall using wireshark

Module 4:

  1. Construct a wireless network with password protection and perform war driving
  2. Build a wireless network and protect it using MAC filtering
  3. Plan and configure a network system with full security measures like, antivirus software, firewall and wireless protection.
  4. Open Ended Experiments**

Suggested Open Ended Experiments

(Not for End Semester Examination but compulsory to be included in Continuous Internal Evaluation. Students can do open ended experiments as a group of 2-3. There is no duplication in experiments between groups.)

  1. Set up an Intrusion Detection System
  2. Conduct IP Packet crafting
  3. Perform Ping and Ping sweep using tools other than NMAP
  4. Setup an IP logger

Text Books:

  1. Hands on Ethical Hacking and Network Defense, 2nd Edition, Michael T Simpson, Kent Back man, James Coreley

Reference Books:

  1. W. Stallings, Data and Computer Communications.
  2. W. Stallings, Cryptography and Network Security: Principles and Practice

Online Resources

  1. http://uou.ac.in/foundation-course – Introduction to cyber security

For detailed syllabus of all other subjects of Cyber Forensics & Information Security, 2021 revision curriculum do visit Cyber Forensics & Information Security (CF) 7th Sem subject syllabuses for 2021 revision.

To see the syllabus of all other branches of diploma 2021 revision curriculum do visit SITTTR diploma all branches syllabus..

To see the results of Cyber Forensics & Information Security of diploma 2021 revision curriculum do visit SITTTR diploma results..

For all Cyber Forensics & Information Security academic calendars, visit Cyber Forensics & Information Security all semesters academic calendar direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.