23IC24E CYBER SECURITY AND ETHICAL HACKING L T P C 3 0 0 3
COURSE OUTCOMES
CO1: choose the appropriate tools to support an ethical hack and defend the major issues.
CO2: interpret the results of a controlled attack in the area of cyber security
CO3: experience the role of politics, inherent and imposed limitations and metrics for planning of a test
CO4: comprehend the dangers associated with penetration testing
INTRODUCTION TO ETHICAL HACKING 9
Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations, Reconnaissance,
Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration. Information
Security Models: Computer Security, Network Security, Service Security, Application Security, Security
Architecture Information Security Program: The Process of Information Security, Component Parts of
Information Security Program, Risk Analysis and Ethical Hacking.
THE BUSINESS PERSPECTIVE 9
Business Objectives, Security Policy, Previous Test Results, Business Challenges. Planning for a Controlled
Attack: Inherent Limitations, Imposed Limitations, timing is Everything, Attack Type, Source Point,
Required Knowledge, Multi-Phased Attacks, Teaming and Attack Structure, Engagement Planner, The
Right Security Consultant, The Tester, Logistics, Intermediates, Law Enforcement.
PREPARING FOR A HACK 9
Technical Preparation, Managing the Engagement. Reconnaissance: Social Engineering, Physical Security,
Internet Reconnaissance.
ENUMERATION 9
Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration, Preparing
for the Next Phase. Exploitation: Intutive Testing, Evasion, Threads and Groups, Operating Systems,
Password Crackers, RootKits, applications, Wardialing, Network, Service and Areas of Concern.
DELIVERABLE 9
The Deliverable, The Document, Overall Structure, Aligning Findings, Presentation. Integration:
Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident Management,
Security Policy.
L: 45; TOTAL: 45 PERIODS
REFERENCES
1. EC-Council, “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning, 2016.
2. James S. Tiller, “The Ethical Hack: A Framework for Business Value Penetration Testing”, Auerbach
Publications, CRC Press, 2004.
3. Michael Simpson, Kent Backman, James Corley, “Hands-On Ethical Hacking and Network Defense”,
Cengage Learning, 2010.