Information and Communication TechnologycoretheorySem 3
ETHICAL HACKING
ICT 4414
Syllabus
- 01Introduction
- 02Types
- 03Terminologies and Laws
- 04Foot printing
- 05Social Engineering
- 06Malware and Virus
- 07Vulnerability Assessment
- 08DDOS attacks
- 09SQL injection
- 10Sniffing and System Hijacking
- 11Session Hijacking
- 12Scanning and Enumeration
- 13Web Servers attacks
- 14Pentesting Report
- 15Tools for each of attacks and Countermeasures
References
- Ric Messier, Certified Ethical Hacker Version 10- Study Guide, 10th edition, Sybex Wiely, 2019
- Corey P. Schultz, Bob Percianccante, Kali Linux Cook Book, 2nd edition, Packt Publishing, 2017
- Phillip L. Wylie, Kim Crawley, The Pentester Blue Print, 1st edition, Wiley, 2020
- Christopher Hadnagy, Social Engineering: The Art of Human Hacking, 1st edition, Wiley, 2020
- James Corley, Kent Backman, Michael Simpson, Hands on Ethical hacking and network Defense 2nd edition, Delmar Cengage Learning, 2010
- John Erickson, Hacking: The art of exploitation, 2nd edition, No Starch Press, 2008
- Patrick Engebretson, The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy, 1st edition, Syngress Media, U.S., 2010
Credits Structure
3Lecture
0Tutorial
0Practical
3Total