KEMBAR78
Ethical Hacking | PDF | Security | Computer Security
0% found this document useful (0 votes)
88 views3 pages

Ethical Hacking

The document outlines the syllabus for a B.Tech course on Ethical Hacking at Malla Reddy Engineering College, detailing prerequisites, course objectives, and module topics. It covers the methodologies of ethical hacking, including planning, execution, and analysis of controlled attacks, as well as the business perspective and technical preparation involved. The course aims to equip students with knowledge of ethical hacking tools, result interpretation, and the associated risks of penetration testing.

Uploaded by

thangedikishore
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views3 pages

Ethical Hacking

The document outlines the syllabus for a B.Tech course on Ethical Hacking at Malla Reddy Engineering College, detailing prerequisites, course objectives, and module topics. It covers the methodologies of ethical hacking, including planning, execution, and analysis of controlled attacks, as well as the business perspective and technical preparation involved. The course aims to equip students with knowledge of ethical hacking tools, result interpretation, and the associated risks of penetration testing.

Uploaded by

thangedikishore
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

2020-21

MALLA REDDY ENGINEERING COLLEGE B.Tech.


Onwards
(Autonomous) VI Semester
(MR-20)
Code: A6209 L T P
ETHICAL HACKING
Credits: 3 3 - -

Prerequisites:

 A course on “Operating Systems”


 A course on “Computer Networks”
 A course on “Network Security and Cryptography”

Course Objectives:

 The aim of the course is to introduce the methodologies and framework of ethical
hacking for enhancing the security.
 The course includes-Impacts of Hacking; Types of Hackers; Information Security
Models; Information Security Program; Business Perspective; Planning a Controlled
Attack; Framework of Steps (Reconnaissance, Enumeration, Vulnerability Analysis,
Exploitation, Deliverable and Integration)

MODULE – I: Introduction
Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations, Reconnaissance,
Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration
Information Security Models: Computer Security, Network Security, Service Security,
Application Security, Security Architecture Information Security Program: The Process of
Information Security, Component Parts of Information Security Program, Risk Analysis and
Ethical Hacking

MODULE – II: The Business Perspective


Business Objectives, Security Policy, Previous Test Results,
Business Challenges Planning for a Controlled Attack: Inherent Limitations, Imposed
Limitations, Timing is Everything, Attack Type, Source Point, Required Knowledge, Multi-
Phased Attacks, Teaming and Attack Structure, Engagement Planner, The Right Security
Consultant, The Tester, Logistics, Intermediates, Law Enforcement

MODULE – III: Preparing for a Hack


Technical Preparation, Managing the Engagement Reconnaissance: Social Engineering, Physical
Security, Internet Reconnaissance

UNIT – IV: Enumeration


Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration,
Preparing for the Next Phase Exploitation: Intutive Testing, Evasion, Threads and Groups,
Operating Systems, Password Crackers, Root Kits, applications, Wardialing, Network,
Services and Areas of Concern
UNIT -V: Deliverable
The Deliverable, The Document, Overal Structure, Aligning Findings, Presentation Integration:
Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident
Management, Security Policy, Conclusion

TEXT BOOK

 James S. Tiller, “The Ethical Hack: A Framework for Business Value Penetration
Testing”, Auerbach Publications, CRC Press

REFERENCE BOOKS

 EC-Council, “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning


 Michael Simpson, Kent Backman, James Corley, “Hands-On Ethical Hacking and
Network Defense”, Cengage Learning

Course Outcomes:

 Gain the knowledge of the use and availability of tools to support an ethical hack
 Gain the knowledge of interpreting the results of a controlled attack
 Understand the role of politics, inherent and imposed limitations and metrics for planning
of a test
 Comprehend the dangers associated with penetration testing

CO- PO, PSO Mapping


(3/2/1 indicates strength of correlation) 3-Strong, 2-Medium, 1-Weak
Programme Outcomes(POs) PSOs
C PO PO PO PO PO PO PO PO PO PO PO PS PS PS
O sPO 0
1
1
1
2
1
1
O
2
O
3
O
CO 1 1 1 1 1 1 1
CO 1 2 2 2 1 1 1 2
CO 1 1 1 2 1 1 1 1
CO 1 1 1 1 1 1 1 1 1
CO 1 2 2 2 2 2 2 1 3

You might also like