0% found this document useful (0 votes)
19 views22 pages

Ethical Hacking Vac

Uploaded by

munilifestyle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views22 pages

Ethical Hacking Vac

Uploaded by

munilifestyle
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Value added course

P.Muni Raja Chandra


Co-ordinator
AALIM MUHAMMED SALEGH COLLEGE OF ENGINEERING
AVADI - IAF, CHENNAI-55
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE

CIRCULAR

Circular:AI&DS/2023/VDC02 31.10.2023

It is hereby informed that all the II year Students of Artificial Intelligence and Data Science
Department have to attend the Value -added course on “Ethical Hacking” by Dr.GayetriDevi S.V,
Principal Consultant-Technical, Thiramai LLP,Chennai.

All students are requested to register the before the deadline 1/11/2024 without fail.

Venue: AI&DS Computer Center I

Duration : 30 Hrs

StartDate:6/11/2024

End Date: 30/11/2024

COORDINATOR HOD/AI&DS
Brochure
AALIM MUHAMMED SALEGH COLLEGE OF ENGINEERING
AVADI – IAF, CHENNAI-55
DEPARTMENT OF ARTIFICIAL INTELLIGENCE AND DATA SCIENCE

VALUE ADDED COURSE ON “ETHICAL HACKING


BATCH : 2022-2026 Year / Semester / Sec : II/III

WEEK-
S.NO. REG. NO. NAME OF THE STUDENT

1 110122243001 AAFRIN NATHISSHA D


2 110122243002 AASIFA A
3 110122243003 ABDUL ATHIL I
4 110122243004 ABDUL KADHAR R
5 110122243005 ABDUL RAHMAN A

6 110122243006 ABUL AYUBUL ANSARI T

7 110122243007 ADIL AL MANSOOR A


8 110122243008 AHMAD M
9 110122243009 AKIF RAYAN SHARIFF
10 110122243010 ASIF A.R
ASMATHUL FAHUMITHA
11 110122243011
M
12 110122243012 BHUVANESHWARAN G
13 110122243013 CHARU R
14 110122243014 FARIATHTHEEN F
15 110122243015 HAFIL A
16 110122243016 IMRAN FARHAT M I
17 110122243017 IRFAN S
18 110122243018 IRFANA NASREEN I
19 110122243019 MAHALAKSHMI M
20 110122243020 MIRZA MUDASSIR
MOHAMED ABDUL
21 110122243021
KAREEM I
22 110122243022 MOHAMED APSAR S
23 110122243023 MOHAMED HAMDEEN A
MOHAMED MUAZ AL
24 110122243024
HAKEEM M
25 110122243025 MOHAMED MUFRIH A
MOHAMED MUSTHAKIM J
26 110122243026
A
MOHAMED RASOOL DEEN
27 110122243027
S
28 110122243028 MOHAMMED HUSSAIN S
29 110122243029 MUHUFASSAL S
30 110122243030 NAFRASH MOHAMED K
31 110122243031 NAYEEM S
32 110122243032 NUSRATH FARHEEN
33 110122243033 RAHIMUNISA R
34 110122243034 SHAHID S
35 110122243035 SHAKIL ANWAR A
36 110122243036 TAWFIQ IMRAN J S
37 110122243037 THAMIZHAZHAGAN S
38 110122243038 VISWANATHAN S
39 110122243301 AJITHKUMAR R
40 110122243302 DEVA G
41 110122243303 ISTHAFA MUDDIN M
42 110122243304 MOHAMED ARAFATH M
43 110122243305 MUFEED A
44 110122243306 RUSHWIN AHMED R

Coordinator HOD
Topics Covered in Course

1. Introduction to Ethical Hacking

- Definition and importance

- Types of hackers

- Ethical hacking vs. malicious hacking

- Legal implications and ethical considerations

2. Foot printing and Reconnaissance

- Information gathering techniques

- Tools for reconnaissance

- Passive and active reconnaissance

- Social engineering

3. Scanning Networks

- Network scanning techniques

- Vulnerability scanning

- Tools for network scanning (Nmap, Nessus, etc.)

- Identifying live hosts and open ports

4. Enumeration

- Enumeration techniques

- Tools for enumeration

- Identifying user accounts, shared resources, and services

5. System Hacking

- Gaining access

- Privilege escalation

- Maintaining access

- Covering tracks
6. Malware Threats

- Types of malware (viruses, worms, trojans, ransomware, etc.)

- Malware analysis and detection

- Antivirus evasion techniques

7. Sniffing

- Network sniffing techniques

- Packet capturing and analysis

- Tools for sniffing (Wireshark, Tcpdump, etc.)

- Countermeasures

8. Social Engineering

- Social engineering attacks

- Phishing, pretexting, baiting, and tailgating

- Defense against social engineering

9. Denial of Service (DoS) Attacks

- Types of DoS and DDoS attacks

- Attack techniques and tools

- Mitigation strategies

10. Session Hijacking

- Session hijacking techniques

- Tools for session hijacking

- Mitigation strategies

11. Hacking Web Servers

- Web server vulnerabilities

- Attacking web servers

- Securing web servers


12. Hacking Web Applications

- Common web application vulnerabilities (SQL injection, XSS, CSRF, etc.)

- Attacking web applications

-Securing web applications

13. SQL Injection

- SQL injection techniques

- Exploiting SQL injection vulnerabilities

- Mitigation strategies

14. Hacking Wireless Networks

- Wireless encryption standards

- Wireless hacking techniques

- Tools for wireless hacking

- Securing wireless networks

15. Evading IDS, Firewalls, and Honeypots

- Techniques to evade detection

- Tools and methods for evasion

- Intrusion detection systems (IDS) and firewalls

- Honeypot systems

16. Cryptography

- Basics of cryptography

- Symmetric and asymmetric encryption

- Cryptographic attacks

- Public Key Infrastructure (PKI)

17. Penetration Testing

- Penetration testing methodologies

- Planning and scoping


- Conducting a penetration test

- Reporting and documentation

18. Ethical Hacking Tools

- Overview of popular hacking tools (Metasploit, Burp Suite, etc.)

- Usage and application in various scenarios

19. Cloud Security

- Cloud computing concepts

- Security challenges in the cloud

- Attacking and securing cloud environments

20. Mobile Hacking

- Mobile platform vulnerabilities

- Attacking mobile devices

- Securing mobile applications and devices

21. IoT Hacking

- Internet of Things (IoT) security issues

- Attacking IoT devices

- Securing IoT devices


CERTIFICATE
This is to certify that
___________________________________________________________ of
Aalim
Muhammed Salegh College of Engineering has
participated and successfully completed a value
added course on ________________________________________________________
conducted by Department of Artifical Intelligence &
Data Science during___________________

Coordinator Resource Person Principal

Mr. P. Muniraja Chandra Dr. S.V GAYETRI DEVI Dr. S. Sathish


Assistant Professor Principal Consultant Professor
PHOTOS

Dr.Gayetri devi,Resourse person -Hands on training on 16/11/2023


EVENT FEEDBACK FORM

Reg. No. :
Name of the student :
Department :
Year/Sem :
Name of the speaker :
Topic :
Date & Time :
Please tick the option you find most suitable
Note: 5 - Excellent, 4 - Good, 3 - Average, 2 - Poor, 1 - Very Poor
S.N Particulars 5 4 3 2 1
o.

1. Are you satisfied with the time and venue?

2 How relevant was the content discussed by the


speaker?

3. How interesting was this session for you?

Subject content

Technical presentation by Faculty

4. Did the lecture cover what you were expecting?

5. Overall effectiveness of the lecture

6. How was the overall organization of the lecture?

Additional comments and suggestions:

Participant Signature
FEEDBACK ANALYSIS
1. Extent of coverage of course

2. Depth of course coverage


3. Applicability/relevance of curriculum in real life situations

4. Learning Skills (in terms of Practical, Communication,


Team work, Leadership, Research)
Action Taken Report

Feedback Action taken Impact

Students emphasized on Formal instructions were Arranged a faculty member


more hands-on training based given to all the coordinator to organize extra hours for
on the course. through competent authority practicing the above
(HOD) for addressing the mentioned issue and its taken
issue of Organizing more cared.
hands-on training on
upcoming courses conducted

Coordinator HOD Principal


Summary Report: Ethical Hacking Course

Course Overview
The Ethical Hacking course was conducted as a value-added program to enhance
students' understanding of cybersecurity principles and practices. The course aimed to equip
participants with the skills necessary to identify, analyze, and mitigate security threats,
preparing them for careers in cybersecurity.

Objectives
Understand Ethical Hacking:
Grasp the fundamental concepts and importance of ethical hacking in maintaining
cybersecurity.
Hands-On Experience:
Gain practical experience in identifying and exploiting vulnerabilities.
Legal and Ethical Aspects:
Learn the legal and ethical considerations of hacking.
Tool Proficiency:
Familiarize with tools and techniques used in ethical hacking.

Conclusion
The Ethical Hacking course successfully provided students with a solid foundation in
cybersecurity principles and practices. The practical experience gained during the course has
empowered participants to pursue further studies and careers in the field of cybersecurity.
Future iterations of the course will incorporate feedback to enhance the learning experience.

You might also like