ETHICAL HACKING

Paper Code: 
CBCA 601
Credits: 
3
Periods/week: 
3
Max. Marks: 
100.00
Objective: 

The course will enable the students to

  1. Learn the Principles, Techniques of Ethical Hacking.
  2. Understand Tools for Ethical Hacking

 

Course Outcomes (COs):

 

Learning Outcome (at course level)

 

Learning and teaching strategies

Assessment Strategies

CO 232 Discuss the concepts of ethical hacking.

CO 233 Analyze the different stages of a cyber-attack.

CO 234 Implement basic reconnaissance application

CO 235 Compare various types of malware and cyber-attack vectors and players.

CO 236 Execute various methods for evading security controls.

CO 237 Perform vulnerability and pen testing

Interactive Lectures, Discussion, Tutorials, Reading assignments, Demonstrations, Team teaching, Teaching using advanced IT audio-video tools, G-suite.

Class test, Semester end examinations, Quiz, Solving problems in tutorials, Assignments, Presentation, Individual and group projects and peer review.

 

9.00
Unit I: 

Introduction to Hacking –The Evaluation and Growth of Hacking, Types of Ethical Hackers – Hacktivism –Hacking Methodologies, File Securing Techniques, Ethics and the Law. How is Ethical hacking different from security auditing and digital forensics?

 

9.00
Unit II: 

IP Addresses- Basic, Classes of IP Addresses, Detecting, Allotment of IP Address, IPV4 and IPV6, Ping and Ping Sweep, Ping Sweeping tools, Nmap, Detecting victim’s OS, and Detecting Firewalls.

 

 

9.00
Unit III: 

Introduction to Footprinting –Steps of Ethical Hacking, Information Gathering Methodology,Goals of Footprinting Process,Types of Footprinting, Footprinting Tools, WHOIS Tools, DNS Information Tools, Locating the Network Range, Meta Search Engines.

 

9.00
Unit IV: 

Introduction to Scanning –Objectives, three-way Handshake Protocol, Scanning Methodology, Tools, Port Scanning. Introduction to Enumeration, Enumeration Techniques, Enumeration Procedure, Tools.

 

9.00
Unit V: 

System Hacking-Introduction –Cracking Passwords, Password Cracking Websites, Password Guessing, Password Cracking Tools, Password Cracking Countermeasures, Escalating Privileges, Keyloggers and Spyware.

 

ESSENTIAL READINGS: 

1. Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt. Ltd, 2010

2. Michael T. Simpson, "Hands-on Ethical Hacking & Network Defense", Course Technology, 2010.

 

REFERENCES: 

1. Ankit Fadia “Ethical Hacking” second edition Macmillan India Ltd, 2006.

 

 

Academic Year: