Command Palette

Search for a command to run...

Information and Communication TechnologycoretheorySem 3

ETHICAL HACKING

ICT 4414

Syllabus

  • 01Introduction
  • 02Types
  • 03Terminologies and Laws
  • 04Foot printing
  • 05Social Engineering
  • 06Malware and Virus
  • 07Vulnerability Assessment
  • 08DDOS attacks
  • 09SQL injection
  • 10Sniffing and System Hijacking
  • 11Session Hijacking
  • 12Scanning and Enumeration
  • 13Web Servers attacks
  • 14Pentesting Report
  • 15Tools for each of attacks and Countermeasures

References

  • Ric Messier, Certified Ethical Hacker Version 10- Study Guide, 10th edition, Sybex Wiely, 2019
  • Corey P. Schultz, Bob Percianccante, Kali Linux Cook Book, 2nd edition, Packt Publishing, 2017
  • Phillip L. Wylie, Kim Crawley, The Pentester Blue Print, 1st edition, Wiley, 2020
  • Christopher Hadnagy, Social Engineering: The Art of Human Hacking, 1st edition, Wiley, 2020
  • James Corley, Kent Backman, Michael Simpson, Hands on Ethical hacking and network Defense 2nd edition, Delmar Cengage Learning, 2010
  • John Erickson, Hacking: The art of exploitation, 2nd edition, No Starch Press, 2008
  • Patrick Engebretson, The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, 1st edition, Syngress Media, U.S., 2010
Credits Structure
3Lecture
0Tutorial
0Practical
3Total
MIT Manipal Courses