Prerequisite:
Basic understanding of networking & operating systems
Course Outcome:
After Learning the Course, the students shall be able to:
- Conduct Comprehensive Reconnaissance: Identify and gather information about target systems using various
foot printing and scanning techniques. - Analyze and Exploit Vulnerabilities: Assess network and system vulnerabilities to perform ethical hacking and
penetration testing. - Deploy and Utilize Hacking Tools: Use advanced tools and techniques for network sniffing, malware analysis, and
system exploitation. - Implement Countermeasures: Develop strategies to protect systems from attacks, including evading IDS,
and firewalls, and mitigating DoS attacks. - Conduct Web and Wireless Security Assessments: Evaluate and secure web applications and wireless networks
against potential threats and exploits.
Curriculum
- 15 Sections
- 53 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Module 1: Introduction to Ethical HackingOverview of Ethical Hacking4
- Module 2: Foot printing and Reconnaissance5
- Module 3: Scanning NetworksOverview of Network Scanning4
- Module 4: EnumerationWhat is Enumeration?3
- Module 5: System Hacking5
- Module 6: Malware Threats4
- Module 7: Sniffing4
- Module 8: Social EngineeringWhat is Social Engineering?3
- Module 9: Denial-of-Service (DoS) AttacksWhat is a DoS Attack?3
- Module 10: Session HijackingWhat is Session Hijacking?2
- Module 11: Web Server Hacking3
- Module 12: Hacking Web Applications3
- Module 13: SQL Injection3
- Module 14: Evading IDS, Firewalls, and Honeypots4
- Module 15: Wireless Network Hacking3