Paper-1: Ethical Hacking Contents
Paper-1: Ethical Hacking Contents
Paper-1
1. INTRODUCTION TO NETWORKING
1. Introduction & History
2. Advantage & Disadvantage
3. Computer Networks Protocol
4. OSI Model & Physical Topology
5. Network Architecture
6. Communication Media
3. IP ROUTING
1. Introduction to hardware & software related to IP routing
2. Routing information Protocol
3. Enhanced Interior Routing Protocol
4. Open Shortest Path First
Paper - 2
1. INFORMATION SECURITY & ETHICAL HACKING
1. Introduction
2. Basics of Data
3. Information
4. Security
5. Hacking
6. Richard's Law of computer security
7. Types of hackers
8. Cyber Threats
9. Case Studies
3. Firewall
4. Anti-virus
5. Anti Spyware
6. Network Scanner
7. Introduction to Wireless Network security
6. WINDOWS REGISTRIES
1. Reshack
2. Registry tweaks
7. HACKING ATTACKS
1. Social Engineering Attack
2. Phishing Attack
3. Input Validation Attack
4. SqL injection
5. XSS attack
6. Attack Dos Attacks
7. Sniffing Attack
8. Session Hijacking etc.
3. Mail servers
4. E-mail Protocol
5. Web Servers (introduction to web Security)
Network Security
Trimester-2
Paper - 1
1. PROGRAMMING IN C
1. Introduction to C
2. Data Types
3. Basic programming concept
4. If else ladder
5. Switch statements
6. Array, simple array ,multi dimension
7. Function
8. Loops: for, do while, while
9. Structure, structure with function, structure array,
10.Pointer
11.Multiple return from function
12.Pointer to function, passing value through pointer
13.Introduction to file handling ,what is text file
14.Preprocessor compiler (#)
2. PROGRAMMING IN C++
1. OOPS
2. Class, how to declare a class
3. Inheritance, Polymorphism, Operator overloading,
4. Abstraction
5. Using class with function
6. Exception handling
7. Template, generic class
2. Mobile Technology
3. GSM Technology
4. CDMA Technology
5. Different type of attacks
3. ROUTER SECURITY
2. Introduction to router
3. Protocols on a router and types of connection
4. NAT Services
5. Various types of Attacks and their Detection
Trimester-3
Paper - 1
1. VULNERABILITY ASSESSMENT & PENETRATION TESTING
1. Scoping and Tools for Vulnerability Tests
2. Risk Assessment
3. Google Hacking
4. Methodology
5. Google Hacking
6. Application Audit
7. Network Devices
5. Back door
6. Trojans
7. Enumeration
Paper - 2
1. INFORMATION SECURITY MANAGEMENT SYSTEM
1. ISO 27001 and other Standard
2. Policy & Projects
3. Audit & Certification
4. Managing Security Awareness
5. Risk Assessment
6. Business Continuity and Disaster Recovering
7. Planning Security Management Practices
3. SECURITY FRAMEWORK-COBIT
1. Security
2. Adequate Security
3. Approaches for Achieving Security
4. Holistic View of Security
5. Defense in Depth
6. OCTAVE
7. Security Risk Analysis
8. Threats Modeling
9. Current Security Issues
10.Trends for Security
Computer Forensics
Trimester-4
Paper - 1
1. CRYPTOGRAPHY & ENCRYPTION
1. Introduction to cryptography
2. SKCS
ETHICAL HACKING CONTENTS
3. PKCS
4. MD5
5. DES
6. RSA
7. Digital signature
8. Digital certificate
Paper - 2
1. CYBER CRIME INVESTIGATION
1. Forensics methodology and forensic tool kit
3. COMPUTER FORENSICS
2. Introduction to Cyber Forensics
3. Cyber Crimes
4. Recognizing Preparation and Preservation
5. Documentation and reporting
6. Security Systems to Prevent Further Attacks
7. Basic Steps in Forensic Analysis of UNIX System
8. Crime Scene Management
9. Live System Data Gathering
10.Recovering of deleted files
11.Non- verbal analysis
12.Interpretation of common LOG files
13. Advanced Honey Pots