0% found this document useful (0 votes)
98 views2 pages

Bharathiyar University Ethical Hacking

Ethical Hacking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views2 pages

Bharathiyar University Ethical Hacking

Ethical Hacking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

B. Sc. Artificial Intelligence & Machine Learning Syllabus w.e.f.

2022-2025 Onwards - Affiliated Colleges


Annexure No.31C SCAA date: 18.05.2023

Course Code Ethical Hacking L T P C

Core/elective/Supportive Skill Based Subject: 3 6 0 0 4


Pre-requisite None Syllabus 2022-25
Course Batch
Objectives
• To introduce the concepts of security and carious kinds of attacks
• To explain about system hacking and penetration testing

Expected Course
Outcomes
1 Explain the importance of security and various types of attacks K2
2 Understand the concepts of scanning and system hacking K2
3 Explain about penetration testing and its methodology K2
4 Identify the various programming languages used by security professional K4
K1–RememberK2–UnderstandK3–applyK4-AnalyzeK5–evaluateK6-Create

UNIT I Introduction To Hacking 18


Introduction to Hacking – Importance of Security – Elements of Security – Phases of an Attack –
Types of Hacker Attacks – Hacktivism – Vulnerability Research – Introduction to Foot printing –
Information Gathering Methodology–Foot printing Tools–WHO IS Tools–DNS Information
Tools–Locating the Network Range–Meta Search Engines.
UNIT II Scanning And Enumeration 18
Introduction to Scanning–Objectives–Scanning Methodology–Tools–Introduction to Enumeration–
Enumeration Techniques–Enumeration Procedure–Tools.
UNIT III System Hacking 18
Introduction–Cracking Passwords–Password Cracking Websites–Password Guessing–Password
Cracking Tools–Password Cracking Counter measures–Escalating Privileges–Executing Applications–
Key loggers and Spyware.
UNIT IV Programming For Security Professionals 18
Programming Fundamentals–C language–HTML–Perl–Windows OS Vulnerabilities–Tools for
Identifying Vulnerabilities – Counter measures – Linux OS Vulnerabilities – Tools
For Identifying Vulnerabilities–Counter measures
UNIT V Penetration Testing 18
Introduction–Security Assessments–Types of Penetration Testing-Phases of Penetration Testing–
Tools–Choosing Different Types of Pen-Test Tools–Penetration Testing Tools.
Total Lecture 90Hours
Hours
Text Book(s)
1 EC-Council,―EthicalHackingandCountermeasures:AttackPhases‖,CengageLearning,2010.
2 JonErickson,―Hacking,2ndEdition:TheArtofExploitation‖,NoStarchPressInc.,2008.
3 MichaelT.Simpson,KentBackman,JamesE.Corley,―Hands-OnEthicalHacking
andNetworkDefense‖,CengageLearning,2013.
Reference Book(s)
1 PatrickEngebretson,―TheBasicsofHackingandPenetrationTesting–EthicalHackingand
PenetrationTestingMadeEasy‖,SecondEdition,Elsevier,2013.
2 RafayBoloch,―EthicalHackingandPenetrationTestingGuide‖,CRC Press,2014

Page 60 of 87
B. Sc. Artificial Intelligence & Machine Learning Syllabus w.e.f. 2022-2025 Onwards - Affiliated Colleges
Annexure No.31C SCAA date: 18.05.2023

Related Online Contents(MOOC,SWAYAM,NPTEL,Websites etc)


1 https://onlinecourses.swayam2.ac.in/aic20_sp06/preview
2 https://onlinecourses.swayam2.ac.in/arp19_ap79/preview
Course Designed by:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 M L L L L L L L L L
CO3 S M L L L L L L L L
CO4 S M L L L L L L L L
*S-Strong;M-Medium;L-Low

Page 61 of 87

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy