{"id":2845,"date":"2021-06-20T03:27:15","date_gmt":"2021-06-20T03:27:15","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/5135-ethical-hacking-kl-diploma-syllabus-for-computer-hardware-5th-sem-2015-revision-sitttr\/"},"modified":"2021-06-20T03:27:15","modified_gmt":"2021-06-20T03:27:15","slug":"5135-ethical-hacking-kl-diploma-syllabus-for-computer-hardware-5th-sem-2015-revision-sitttr","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/5135-ethical-hacking-kl-diploma-syllabus-for-computer-hardware-5th-sem-2015-revision-sitttr\/","title":{"rendered":"5135: Ethical Hacking KL Diploma Syllabus for Computer Hardware 5th Sem 2015 Revision SITTTR"},"content":{"rendered":"<p align=\"justify\">Ethical Hacking detailed syllabus for Computer Hardware (Computer Hardware) for 2015 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Computer Hardware students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Computer Hardware 5th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/computer-hardware-computer-hardware-kl-diploma-syllabus-for-5th-sem-2015-revision-sitttr\">Computer Hardware 5th Sem 2015 revision scheme<\/a>. The detailed syllabus of ethical hacking is as follows. <\/p>\n<p>  <title>Ethical Hacking<\/title><\/p>\n<h4>Course General Outcome<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Specific outcomes:<\/h4>\n<p align=\"justify\">\n  MODULE &#8211; I: Vulnerabilities and attacks<\/p>\n<ol>\n<li>Understand ethical hacking concepts\n<ol type=\"i\">\n<li>Explain the definition of ethical hacking<\/li>\n<li>List any five malicious software<\/li>\n<li>Explain any five malicious software<\/li>\n<li>Explain how to protect against malware attacks<\/li>\n<li>List any six network and system attacks<\/li>\n<li>Explain any six network and system attacks<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE &#8211; II: Hacking Techniques<\/p>\n<ol>\n<li>Understand the hacking techniques and tools\n<ol type=\"i\">\n<li>Describe how web tools are used for footprinting<\/li>\n<li>Explain competitive intelligence<\/li>\n<li>Describe the use of other footprinting tools<\/li>\n<li>Explain the method of DNS zone transfer<\/li>\n<li>Explain the art of shoulder surfing<\/li>\n<li>Explain the art of dumpster diving<\/li>\n<li>Explain the art of piggy backing<\/li>\n<li>Describe various types of port scans<\/li>\n<li>Explain the use of port scanning tools such as Nmap, Unicornscan, Nessus and OpenVAS<\/li>\n<li>Explain how to conduct ping sweeps<\/li>\n<li>Describe about crafting IP packets<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE &#8211; III: Operating System Vulnerabilities<\/p>\n<ol>\n<li>Understand various vulnerabilities of Windows and Linux\n<ol type=\"i\">\n<li>Explain Windows file system<\/li>\n<li>Explain Windows RPC<\/li>\n<li>Explain NetBIOS<\/li>\n<li>Explain Server Message Block<\/li>\n<li>Explain common Internet File System<\/li>\n<li>Explain null sessions<\/li>\n<li>Explain Web Services<\/li>\n<li>Explain Buffer overflows<\/li>\n<li>Explain Windows passwords and authentication<\/li>\n<li>Explain the tools for identifying Windows vulnerabilities<\/li>\n<li>Explain the best practices for hardening Windows systems<\/li>\n<li>Explain Linux OS vulnerabilities<\/li>\n<li>Explain the tools for identifying Linux vulnerabilities<\/li>\n<li>Explain the countermeasures against Linux attacks<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>  MODULE &#8211; IV: Hacking Web Servers and Wireless Networks<\/p>\n<ol>\n<li>Understand the techniques to hack web servers and tools for it.\n<ol type=\"i\">\n<li>Explain web server hacking<\/li>\n<li>Explain about web applications and their components<\/li>\n<li>Describe web application vulnerabilities and countermeasures<\/li>\n<li>Identify the tools used by web attackers and hackers<\/li>\n<li>Explain wireless hacking<\/li>\n<li>Describe the components of a wireless network<\/li>\n<li>Explain the working of wardriving<\/li>\n<li>Explain the tools for wireless hacking<\/li>\n<li>Explain the countermeasures against wireless attacks<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<h4>MODULE &#8211; I: Vulnerabilities and attacks<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>MODULE &#8211; II: Hacking Techniques<\/h4>\n<p align=\"justify\">\n  Footprinting &#8211; Web tools are used for footprinting, Competitive intelligence, Other footprinting tools, DNS zone transfer &#8211; Social engineering &#8211; Shoulder surfing, Dumpster diving, Piggy backing &#8211; Port scanning &#8211; Types of port scans, Port scanning tools &#8211; Nmap, Unicornscan, Nessus and OpenVAS &#8211; Ping sweeps &#8211; Crafting IP packets\n<\/p>\n<h4>MODULE &#8211; III: Operating System Vulnerabilities<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>MODULE &#8211; IV: Hacking Web Servers and Wireless Networks<\/h4>\n<p align=\"justify\">\n  Web server hacking &#8211; Web applications and their components &#8211; Web application vulnerabilities and countermeasures &#8211; Tools for web attackers and hackers Wireless hacking &#8211; Wireless network technology &#8211; Components of a wireless network -Wardriving &#8211; Tools for wireless hacking &#8211; Countermeasures against wireless attacks\n<\/p>\n<h4>Text Books:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Reference Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Official Certified Ethical Hacker Review Guide &#8211; DeFino Steven, Kaufman Barry, Valenteen Nick-Cengage Learning&#8211;2009 Engebret-sonyngress<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Computer Hardware, 2015 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/computer-hardware+5th-sem\">Computer Hardware 5th Sem subject syllabuses for 2015 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2015 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/kerala-diploma-syllabus\/\">all branches of SITTTR diploma 2015 revision<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking detailed syllabus for Computer Hardware (Computer Hardware) for 2015 revision curriculum has been taken from the SITTTRs official website and presented for the Computer Hardware students. For course [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[36,48],"tags":[],"class_list":["post-2845","post","type-post","status-publish","format-standard","hentry","category-5th-sem","category-computer-hardware"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/2845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=2845"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/2845\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=2845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=2845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=2845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}