0% found this document useful (0 votes)
125 views7 pages

Paper-1: Ethical Hacking Contents

The document outlines an educational program on ethical hacking and network security across 4 trimesters and 12 papers. The program covers topics such as networking, protocols, operating systems security, penetration testing, cryptography, cybercrime investigation and computer forensics. It aims to provide students training in both offensive security techniques as well as defensive security management practices.

Uploaded by

9630455310
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
125 views7 pages

Paper-1: Ethical Hacking Contents

The document outlines an educational program on ethical hacking and network security across 4 trimesters and 12 papers. The program covers topics such as networking, protocols, operating systems security, penetration testing, cryptography, cybercrime investigation and computer forensics. It aims to provide students training in both offensive security techniques as well as defensive security management practices.

Uploaded by

9630455310
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

ETHICAL HACKING CONTENTS

Training | Consulting | Outsourcing


1 Trimester-1

Paper-1
1. INTRODUCTION TO NETWORKING
1. Introduction & History
2. Advantage & Disadvantage
3. Computer Networks Protocol
4. OSI Model & Physical Topology
5. Network Architecture
6. Communication Media

2. THE INTERNET PROTOCOL (IP)


1. Introduction to IP
2. IP Packet Format
3. IP Address Classes
4. Transmission Control Protocol
5. Subnetting & CIDR

3. IP ROUTING
1. Introduction to hardware & software related to IP routing
2. Routing information Protocol
3. Enhanced Interior Routing Protocol
4. Open Shortest Path First

4. SWITCHING & BRIDGING


1. Introduction of Switching & Bridging
2. STP & LAN Switch Types
3. VLAN - Virtual LAN
4. Flexibility and Scalability

5. WIDE AREA NETWORK


1. Understanding WAN fundamentals
2. Understanding Tunneling Protocol & Frame Relay
3. Fundamentals
4. VPN - Virtual Private Network
5. NAT - Network Address Translation
ETHICAL HACKING CONTENTS

6. NETWORK CONFIGURATION AND


TROUBLESHOOTING
1. Networking Introduction
2. LAN Switching
3. Wireless Networking
4. Layer by Layer Troubleshooting with a Cisco Router
5. Router Troubleshooting at OSI Layers
6. Managing your network connections

7. IMPLEMENTING AND TROUBLE-SHOOTING WI-FI NETWORKS


1. Introduction to 802.11
2. Finding And Connecting To Wireless Networks
3. Introduction to RADIUS
4. EAP & Bringing EAP to the LAN
5. Authenticating the AP to the User, and Vice Versa
6. Scanning and Enumerating 802.11 Networks

Paper - 2
1. INFORMATION SECURITY & ETHICAL HACKING
1. Introduction
2. Basics of Data
3. Information
4. Security
5. Hacking
6. Richard's Law of computer security
7. Types of hackers
8. Cyber Threats
9. Case Studies

2. DESKTOP & SERVER SECURITY


1. Windows Security
2. Windows Vulnerability
3. Hacking into windows platform
4. Windows task manager
5. Linux Security

3. NETWORK & FIREWALL SECURITY


1. Setting up a LAN
2. Threats Of LAN
ETHICAL HACKING CONTENTS

3. Firewall
4. Anti-virus
5. Anti Spyware
6. Network Scanner
7. Introduction to Wireless Network security

4. INTERNET & CYBER SECURITY


1. IP Spoofing
2. E-Mail Tracking
3. Proxy Servers
4. E-mail Forgery and Detection
5. MAC Spoofing
6. Microsoft Outlook Security
7. Cyber Stalking

5. INFORMATION GATHERING METHODS


1. Daemon-Banner Grabbing
2. Active Finger Printing
3. Passive Fingerprinting
4. Port Scanning
5. Full TCP Scan Half TCP Scan
6. Flag
7. Tracert

6. WINDOWS REGISTRIES
1. Reshack
2. Registry tweaks

7. HACKING ATTACKS
1. Social Engineering Attack
2. Phishing Attack
3. Input Validation Attack
4. SqL injection
5. XSS attack
6. Attack Dos Attacks
7. Sniffing Attack
8. Session Hijacking etc.

8. EMAIL SECURITY & WEB SECURITY


1. Introduction to E-mail
2. How E-mail Works
ETHICAL HACKING CONTENTS

3. Mail servers
4. E-mail Protocol
5. Web Servers (introduction to web Security)
Network Security
Trimester-2
Paper - 1
1. PROGRAMMING IN C
1. Introduction to C
2. Data Types
3. Basic programming concept
4. If else ladder
5. Switch statements
6. Array, simple array ,multi dimension
7. Function
8. Loops: for, do while, while
9. Structure, structure with function, structure array,
10.Pointer
11.Multiple return from function
12.Pointer to function, passing value through pointer
13.Introduction to file handling ,what is text file
14.Preprocessor compiler (#)

2. PROGRAMMING IN C++
1. OOPS
2. Class, how to declare a class
3. Inheritance, Polymorphism, Operator overloading,
4. Abstraction
5. Using class with function
6. Exception handling
7. Template, generic class

3. INTRODUCTION TO DATA STRUCTURE


1. Queue
2. Stack
3. Link list
4. Tree
Paper - 2
1. WIRELESS & MOBILE SECURITY
1. Introduction to the Wireless
ETHICAL HACKING CONTENTS

2. Mobile Technology
3. GSM Technology
4. CDMA Technology
5. Different type of attacks

2. VOIP & VPN SECURITY


1. Introduction to the VOIP and VPN Technology Protocol
and Architecture

3. ROUTER SECURITY
2. Introduction to router
3. Protocols on a router and types of connection
4. NAT Services
5. Various types of Attacks and their Detection

4. IDS & IPS


1. Introduction to IPS & IDS
2. IDS Overview (AIDS, HIDS, and NIDS)
3. IDS system & IPS System
4. Perimeter Firewall
5. Analysis of System Deficiencies
6. VoIP & Wireless 7

Trimester-3
Paper - 1
1. VULNERABILITY ASSESSMENT & PENETRATION TESTING
1. Scoping and Tools for Vulnerability Tests
2. Risk Assessment
3. Google Hacking
4. Methodology
5. Google Hacking
6. Application Audit
7. Network Devices

2. SECURED PROGRAMMING TECHNIQUE & ADVANCED


HACKING ATTACKS
1. Defining Programming methodology
2. Explaining Bugs
3. Removing Errors
4. Buffer over flows
ETHICAL HACKING CONTENTS

5. Back door
6. Trojans
7. Enumeration

Paper - 2
1. INFORMATION SECURITY MANAGEMENT SYSTEM
1. ISO 27001 and other Standard
2. Policy & Projects
3. Audit & Certification
4. Managing Security Awareness
5. Risk Assessment
6. Business Continuity and Disaster Recovering
7. Planning Security Management Practices

2. INFORMATION SECURITY AUDITING


1. Audit Objectives & Steps
2. Network Controls
3. Network Data Standards and Data Access
4. Access to Network Operating Systems Software and Facilities
5. Data Encryption and Filtering

3. SECURITY FRAMEWORK-COBIT
1. Security
2. Adequate Security
3. Approaches for Achieving Security
4. Holistic View of Security
5. Defense in Depth
6. OCTAVE
7. Security Risk Analysis
8. Threats Modeling
9. Current Security Issues
10.Trends for Security
Computer Forensics
Trimester-4
Paper - 1
1. CRYPTOGRAPHY & ENCRYPTION
1. Introduction to cryptography
2. SKCS
ETHICAL HACKING CONTENTS

3. PKCS
4. MD5
5. DES
6. RSA
7. Digital signature
8. Digital certificate

Paper - 2
1. CYBER CRIME INVESTIGATION
1. Forensics methodology and forensic tool kit

2. INTERNATIONAL CYBER LAWS

3. COMPUTER FORENSICS
2. Introduction to Cyber Forensics
3. Cyber Crimes
4. Recognizing Preparation and Preservation
5. Documentation and reporting
6. Security Systems to Prevent Further Attacks
7. Basic Steps in Forensic Analysis of UNIX System
8. Crime Scene Management
9. Live System Data Gathering
10.Recovering of deleted files
11.Non- verbal analysis
12.Interpretation of common LOG files
13. Advanced Honey Pots

You might also like