The course is aims to provide the concept of Principles, Techniques and Tools for Ethical Hacking.
Introduction to Hacking –The Evaluation and Growth of Hacking, Types of Ethical Hackers – Hacktivism –Hacking Methodologies, File Securing Techniques, Ethics and the Law.
Introduction to Footprinting –Steps of Ethical Hacking, Information Gathering Methodology,Goals of Footprinting Process,Types of Footprinting, Footprinting Tools, WHOIS Tools, DNS Information Tools, Locating the Network Range, Meta Search Engines.
.
IP Addresses- Basic, Classes of IP Addresses, Detecting, Allotment of IP Address, IPV4 and IPV6, Ping and Ping Sweep, Ping Sweeping tools, Nmap, Detecting victim’s OS, and Detecting Firewalls.
Introduction to Scanning – Objectives, Three way Handshake Protocol, Scanning Methodology, Tools, Port Scanning. Introduction to Enumeration, Enumeration Techniques, Enumeration Procedure, Tools.
System Hacking- Introduction –Cracking Passwords, Password Cracking Websites, Password Guessing, Password Cracking Tools, Password Cracking Countermeasures, Escalating Privileges, Keyloggers and Spyware.
Michael T. Simpson, "Hands-on Ethical Hacking & Network Defense", Course Technology, 2010.
Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt Ltd, 2010