Ethical Hacking

Paper Code: 
25CBCA501
Credits: 
03
Periods/week: 
03
Max. Marks: 
100.00
Objective: 

Course Objectives:

The course will enable the students to

1. Learn the Principles, Techniques of Ethical Hacking.

2. Understand Tools for Ethical Hacking

 

Course Outcomes: 

Course

Learning

Outcome

(at courselevel)

Learning and teaching strategies

Assessment

Strategies

Course

Code

Course

Title

25CBCA601

Ethical Hacking (Theory)

CO265. Evaluate ethical hacking techniques, comply with legal and ethical standards.

CO266. Analyse theimportance of IP address in network & ethical hacking.

CO267. Evaluate ethical hacking assessments using advanced information gathering techniques.

CO268. Investigate the various tools and techniques of scanning and enumeration.

CO269. Assess the system hacking methods, counter measures and escalation techniques.

CO270. Contribute effectively in course- specific interaction.

Approach in teaching: Interactive Lectures, Discussion,Reading assignments, Demonstration.

 

Learning activities for the students: Self learning assignments, Effective questions, Seminar presentation.

Class test, Semester end examinations, Quiz, Assignments, Presentation.

 

9.00
Unit I: 

Introduction to Hacking: The Evaluation and Growth of Hacking, Types of Ethical Hackers– Hacktivism –Hacking Methodologies, File Securing Techniques, Ethics and the Law. Security auditing and Digital forensics: Introduction.

 

9.00
Unit II: 

IP Addresses: Basic, Classes of IP Addresses, Detecting, Allotment of IP Address, IPV4 and IPV6, IP v4 – Address Space, Notations, Classful addressing, classless addressing and NAT, IPv6 – Structure and Address space, IPv4 – Datagram, Fragmentation, Checksum, Options, Ping and Ping Sweep, Ping Sweeping tools, Nmap introduction

 

9.00
Unit III: 

Introduction  to  Foot  printing: Steps  of  Ethical  Hacking,  Information  Gathering Methodology, Goals of Foot Printing Process, Types of Foot printing, Foot printing Tools, WHOIS Tools, DNS Information Tools, Locating the Network Range, Meta Search Engines.

 

 

9.00
Unit IV: 

Introduction   to   Scanning: Objectives,   three-way   Handshake   Protocol,   Scanning Methodology, Tools, Port Scanning. Introduction to Enumeration, Enumeration Techniques, Enumeration Procedure, Tools.

 

9.00
Unit V: 

System Hacking: Introduction –Cracking Passwords, Password Cracking Websites,Password Guessing, Password Cracking Tools, Password Cracking Countermeasures, Escalating Privileges, Keyloggers and Spyware.

 

ESSENTIAL READINGS: 

ESSENTIAL READINGS:

1. Jon Erickson, "Hacking: The Art of Exploitation", No Starch Press, 2003

2. Dafydd Stuttard and Marcus Pinto, "The Web Application Hacker's Handbook:                Discovering and Exploiting Security Flaws", Wiley, 2011.

3. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No        Starch Press, 2014

 

REFERENCES: 

SUGGESTED READINGS:

1. Ankit Fadia, “An Ethical Guide to Hacking Mobile Phones” second edition                  Macmillan India Ltd,2006.

2. Ankit Fadia, “Network Security: A Hacker's Perspective”, Macmillan Publisher, 2002

3. Raef Meeuwisse, “Cybersecurity for Beginners”, Cyber Simplicity Ltd., 2017.

4. Charles J. Brooks, Christopher Grow, and Donald Short,” Cybersecurity                      Essentials”,Wiley,2018.

e -RESOURCES

1.  https://www.javatpoint.com/ethical-hacking-tutorial

2.  https://www.guru99.com/ethical-hacking-tutorials.html

3.  https://www.tutorialspoint.com/ethical_hacking/index.htm

4.  https://www.udemy.com/course/computer-hacking-fundamentals/

5.  https://www.simplilearn.com/ethical-hacking-tutorial-article

 

JOURNALS:

1.  https://dl.acm.org/doi/10.1147/sj.403.0769

2.  http://www.ijcstjournal.org/

3.  International Journal Of Engineering And Computer Science

4.  http://recentscientific.com/ethical-hacking-need-cyber-security

5.  https://www.ijser.org/researchpaper/

 

Academic Year: