Yessd
Yessd
CO1 :: describe the basic concepts of operating systems, cryptography and ethical hacking
CO2 :: discuss various methods of performing footprinting and scanning the target systems
CO4 :: examine the usage of sniffers, social engineering techniques and denial of service attacks
for compromising the target
CO5 :: analyze the functionality of session hijacking, web applications and SQL injection in testing
the security of target
CO6 :: understand the process of identifying the threats to WiFi, Bluetooth, mobile devices, cloud
services and SOC and SIEM solutions
Unit I
Introduction to Ethical Hacking : Hacking Evolution, What Is an Ethical Hacker?, Ethical hacking
and Penetration testing, Hacking methodologies
System Fundamentals : Fundamental of computer networks, Exploring TCP/IP ports, Understanding
network devices, Proxies, Firewall and Network Security, Knowing Operating Systems(Windows, Mac,
Android and Linux)
Cryptography : History of cryptography, Symmetric cryptography, Asymmetric cryptography,
Understanding Hashing, Issues with cryptography, Application of cryptography(IPsec, PGP, SSl)
Unit II
Footprinting : What is Footprinting, Threats Introduced by Footprinting, The Footprinting process,
Using (Search engine, Google hacking, Social networking and Financial services) Information
gathering
Scanning : What is Scanning, Types of Scans, Family tree of Scans, OS fingerprinting,
Countermeasure, Vulnerability Scanning and Using Proxies
Unit III
Enumeration : What is Enumeration, Windows Enumeration, Enumeration with SNMP, LDAP and
Directory Service Enumeration, SMTP Enumeration
System Hacking : What is System Hacking, Password cracking, Authentication on Microsoft
Platforms, Executing Applications
Malware : Malware and the law, Categories of Malware(Viruses, worms, spyware, Adware, Scareware
Ransomware and Trojans), Overt and Covert Channels
Unit IV
Sniffers : Understanding Sniffers, Using a Sniffer, Switched network Sniffing, MAC Flooding, ARP
Poisoning, MAC Spoofing, Port Mirror and SPAN Port, Detecting Sniffing Attacks
Social Engineering : What is Social Enginnering, Social Engineering Phases, Commonly Employed
Threats, Identity Theft
Denial of Service : Understanding DoS, Understanding DDoS, DoS Tools, DDoS Tools, DoS Pen-
Testing Considerations
Unit V
Session Hijacking : Understanding Session Hijacking, Exploring Defensive Strategies, Network
Session Hijacking
Web Servers and Applications : Exploring the Client-Server Relationship, The client and the server,
Vulnerabilities of Web Servers and Application, Testing Web Application
SQL Injection : Introducing SQL Injection, Databases and Their Vulnerabilities, Anatomy of a SQL
Injection Attack, Altering Data with a SQL Injection Attack, Evading Detection Mechanisms, SQL
Injection Countermeasures
Unit VI
Hacking Wi-Fi and Bluetooth : What Is a Wireless Network, A Close Examination of Threats,
Hacking Bluetooth, Introduction to SIEM and SOC Solutions
Mobile Device Security : Mobile OS Models and Architectures, Goals of Mobile Security, Device
Security Models, Countermeasures
Text Books:
1. MASTERING KALI LINUX FOR ADVANCED PENETRATION TESTING by VIJAY KUMAR VELU,
PACKT PUBLISHING
References:
1. CERTIFIED ETHICAL HACKER (CEH) V11 312-50 EXAM GUIDE by DALE MEREDITH, PACKT
PUBLISHING