google-site-verification=EmVnnySXehAfTr_j8ZJN48hwvxJtfNf80pkPX1ObQlA Fast Track News: Ethical Hacking

Ethical Hacking

Exam Preparation PDF

ABOUT THE COURSE :
Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them. There will be hands-on demonstrations that will be helpful to the participants. The participants are encouraged to try and replicate the demonstration experiments that will be discussed as part of the course.

INTENDED AUDIENCE: Computer Science and Engineering / Information Technology / Electronics and Communication / Electrical Engineering
PRE-REQUISITES: Basic concepts in programming and networking
INDUSTRY SUPPORT:   TCS, Wipro, CTS, Google, Microsoft, Qualcomm

 

Summary
Course Status :Ongoing
Course Type :Elective
Duration :12 weeks
Category :
  • Computer Science and Engineering
  • Robotics
  • Systems
Credit Points :3
Level :Undergraduate/Postgraduate
Start Date :24 Jul 2023
End Date :13 Oct 2023
Enrollment Ends :07 Aug 2023
Exam Registration Ends :18 Aug 2023
Exam Date :29 Oct 2023 IST

Course layout

Week 1:   Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.
Week 2:   IP addressing and routing. TCP and UDP. IP subnets.
Week 3:   Routing protocols. IP version 6.
Week 4:   Installation of attacker and victim system. Information gathering using advanced google search,
 archive.org, netcraft, whois, host, dig, dnsenum and NMAP tool.
Week 5:  Vulnerability scanning using NMAP and Nessus. Creating a secure hacking environment.
System Hacking: password cracking, privilege escalation, application execution. Malware and
Virus. ARP spoofing and MAC attack.
Week 6:   Introduction to cryptography, private-key encryption, public-key encryption.
Week 7:   Cryptographic hash functions, digital signature and certificate, applications.
Week 8:   Steganography, biometric authentication, network-based attacks, DNS and Email security.
Week 9:   Packet sniffing using wireshark and burpsuite, password attack using burp suite.
 Social engineering attacks and Denial of service attacks.
Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions, hardware
 trojans.
Week 11: Different types of attacks using Metasploit framework: password cracking, privilege escalation,
 remote code execution, etc.Attack on web servers: password attack, SQL injection, cross site
 scripting.
Week 12: Case studies: various attacks scenarios and their remedies.

Books and references

  1. Data and Computer Communications -- W. Stallings.
  2. Data Communication and Networking -- B. A. Forouzan
  3. TCP/IP Protocol Suite -- B. A. Forouzan
  4. UNIX Network Programming -- W. R. Stallings
  5. Introduction to Computer Networks and Cybersecurity -- C-H. Wu and J. D. Irwin
  6. Cryptography and Network Security: Principles and Practice -- W. Stallings
  7. ** Various web resources **

EXAM PREPARATION PDF :-




Part 1 :
   
Part 2 :
   
Part 3 :
 

No comments:

Post a Comment

April Week 2 || Lab 2 || Troubleshooting Data Models in Looker

  CREATE NEW FILE NAME: user_order_lifetime view: user_order_lifetime { derived_table: { sql: SELECT order_items.user_id as us...