{"id":8032,"date":"2024-04-04T11:29:28","date_gmt":"2024-04-04T11:29:28","guid":{"rendered":"https:\/\/www.inspirenignite.com\/kl\/5139b-ethical-hacking-lab-syllabus-for-information-technology-6th-sem-2021-revision-sitttr-professional-elective-ii\/"},"modified":"2024-04-04T11:29:28","modified_gmt":"2024-04-04T11:29:28","slug":"5139b-ethical-hacking-lab-syllabus-for-information-technology-6th-sem-2021-revision-sitttr-professional-elective-ii","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/kl\/5139b-ethical-hacking-lab-syllabus-for-information-technology-6th-sem-2021-revision-sitttr-professional-elective-ii\/","title":{"rendered":"5139B: Ethical Hacking Lab Syllabus for Information Technology 6th Sem 2021 Revision SITTTR (Professional Elective-II)"},"content":{"rendered":"<p align=\"justify\">Ethical Hacking Lab detailed syllabus for Information Technology (IF) for 2021 revision curriculum has been taken from the <a class=\"rank-math-link\" href=\"http:\/\/www.sitttrkerala.ac.in\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">SITTTRs<\/a> official website and presented for the Information Technology (IF) students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Information Technology 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/sitttr-diploma-information-technology-if-syllabus-for-6th-sem-2021-revision\">Information Technology (IF) 6th Sem 2021 regulation scheme<\/a>. For Professional Elective-II scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/sitttr-information-technology-6th-sem-professional-elective-ii-syllabus-2021-revision\">Information Technology (IF) Professional Elective-II syllabus scheme<\/a>. The detailed syllabus of ethical hacking lab is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<ul>\n<li>Impart hands-on training on various ethical hacking techniques.<\/li>\n<li>Identify the security issues in a network environment and suggest the security measures to be practiced in an organization<\/li>\n<li>Understand the ethics to be followed in a network community.<\/li>\n<\/ul>\n<p><h4>Course Outcomes:<\/h4>\n<p>On completion of the course, the student will be able to:<\/p>\n<ol>\n<li>Experiment with network commands and suggest counter measures for malwares.<\/li>\n<li>Make use of different tools to conduct foot printing and port scanning.<\/li>\n<li>Utilize tools for password hacking and software firewall.<\/li>\n<li>Construct a wireless network system with MAC filtering.<\/li>\n<\/ol>\n<p><h4>Module 1:<\/h4>\n<ol>\n<li>Experiment with ipv4 configuration, gateway, DNS settings, ping command, netstat command, tracert command,<\/li>\n<li>Apply an antivirus software for protection against malware and also perform patching of OS<\/li>\n<li>Organize users in OS and set strong password for users<\/li>\n<\/ol>\n<p><h4>Module 2:<\/h4>\n<ol>\n<li>Make use of whois, nslookup commands for foot printing.<\/li>\n<li>Experiment with port scanning using NMAP and practice various options.<\/li>\n<li>Make use of ping and ping sweep using NMAP<\/li>\n<\/ol>\n<p><h4>Module 3:<\/h4>\n<ol>\n<li>Experiment password hacking methods like brute force, dictionary attack using tools<\/li>\n<li>Utilize wire shark and perform traffic monitoring.<\/li>\n<li>Construct a software firewall using wireshark<\/li>\n<\/ol>\n<p><h4>Module 4:<\/h4>\n<ol>\n<li>Construct a wireless network with password protection and perform war driving<\/li>\n<li>Build a wireless network and protect it using MAC filtering<\/li>\n<li>Plan and configure a network system with full security measures like, antivirus software, firewall and wireless protection.<\/li>\n<li>Open Ended Experiments**<\/li>\n<\/ol>\n<p><h4>Suggested Open Ended Experiments<\/h4>\n<p>(Not for End Semester Examination but compulsory to be included in Continuous Internal Evaluation. Students can do open ended experiments as a group of 2-3. There is no duplication in experiments between groups.)<\/p>\n<ol>\n<li>Set up an Intrusion Detection System<\/li>\n<li>Conduct IP Packet crafting<\/li>\n<li>Perform Ping and Ping sweep using tools other than NMAP<\/li>\n<li>Setup an IP logger<\/li>\n<\/ol>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Hands on Ethical Hacking and Network Defense, 2nd Edition, Michael T Simpson, Kent Back man, James Coreley<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>W. Stallings, Data and Computer Communications.<\/li>\n<li>W. Stallings, Cryptography and Network Security: Principles and Practice<\/li>\n<\/ol>\n<p><h4>Online Resources<\/h4>\n<ol>\n<li>http:\/\/uou.ac.in\/foundation-course &#8211; Introduction to cyber security<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Information Technology, 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/sitttr\/if\">Information Technology (IF) 6th Sem subject syllabuses for 2021 revision<\/a>. <\/p>\n<p align=\"justify\">To see the syllabus of all other branches of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-syllabus\/\"> SITTTR diploma all branches syllabus.<\/a>. <\/p>\n<p align=\"justify\">To see the results of Information Technology of diploma 2021 revision curriculum do visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-results\/\"> SITTTR diploma results.<\/a>. <\/p>\n<p align=\"justify\">For all Information Technology academic calendars, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/kl\/sitttr-academic-calendar\/\"> Information Technology all semesters academic calendar<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking Lab detailed syllabus for Information Technology (IF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Information Technology (IF) students. For [&hellip;]<\/p>\n","protected":false},"author":2462,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[83],"tags":[],"class_list":["post-8032","post","type-post","status-publish","format-standard","hentry","category-if"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/8032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/users\/2462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/comments?post=8032"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/posts\/8032\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/media?parent=8032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/categories?post=8032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/kl\/wp-json\/wp\/v2\/tags?post=8032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}