CF

6281B: Ethical Hacking Syllabus for Cyber Forensics & Information Security 6th Sem 2021 Revision SITTTR (Professional Elective-III)

Ethical Hacking detailed syllabus for Cyber Forensics & Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber Forensics & Information Security (CF) students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Cyber Forensics & Information Security 6th Sem scheme and its subjects, do visit Cyber Forensics & Information Security (CF) 6th Sem 2021 regulation scheme. For Professional Elective-III scheme and its subjects refer to Cyber Forensics & Information Security (CF) Professional Elective-III syllabus scheme. The detailed syllabus of ethical hacking is as follows.

Course Objectives:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

On completion of the course, the student will be able to:

  1. Summarize the concepts of hacking, Malwares, Network attacks and counter measures.
  2. Demonstrate foot printing and port scanning techniques using simple tools.
  3. Summarize operating systems and web Application Vulnerabilities.
  4. Outline counter measures for web application and wireless hacking

Module 1:

Current security issues, Definition of hacking, ethical hacking and need. hacking-ethical issues, Penetration testing Malicious software – Viruses and types, Worms, Trojans programs, Spyware, Adware, protection methods, CIA triad, Network and system attacks -Denial of Service (DoS), Distributed Denial of Service (DDoS), Buffer overflow, Ping of death, Session Hijacking, Brute force attack, Man-in-the middle attack, Dictionary attack, Replay attack.

Module 2:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Module 4:

Web server hacking – Web applications and their components – Web application vulnerabilities and countermeasures – Tools for web attackers and hackers Wireless hacking – Wireless network technology – Components of a wireless network – War driving – Tools for wireless hacking – Countermeasures against wireless attacks.

Text Books:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

  1. Hands on Ethical Hacking and Network Defense, 2nd Edition, Michael T Simpson, Kent Back man, James Coreley

Reference Books:

  1. Data and Computer Communications- W. Stallings
  2. Cryptography and Network Security: Principles and Practice- W. Stallings

Online Resources

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

For detailed syllabus of all other subjects of Cyber Forensics & Information Security, 2021 revision curriculum do visit Cyber Forensics & Information Security (CF) 6th Sem subject syllabuses for 2021 revision.

To see the syllabus of all other branches of diploma 2021 revision curriculum do visit SITTTR diploma all branches syllabus..

To see the results of Cyber Forensics & Information Security of diploma 2021 revision curriculum do visit SITTTR diploma results..

For all Cyber Forensics & Information Security academic calendars, visit Cyber Forensics & Information Security all semesters academic calendar direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.