0% found this document useful (0 votes)
15 views1 page

CS&EH Syllabus

The document outlines a course on Cyber Security and Ethical Hacking, detailing course outcomes that include selecting tools for ethical hacking and understanding penetration testing risks. It covers various topics such as hacking impacts, business perspectives on security, preparation for hacking, enumeration techniques, and the importance of deliverables in the hacking process. Additionally, it lists references for further reading on ethical hacking and countermeasures.

Uploaded by

umakalaimani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views1 page

CS&EH Syllabus

The document outlines a course on Cyber Security and Ethical Hacking, detailing course outcomes that include selecting tools for ethical hacking and understanding penetration testing risks. It covers various topics such as hacking impacts, business perspectives on security, preparation for hacking, enumeration techniques, and the importance of deliverables in the hacking process. Additionally, it lists references for further reading on ethical hacking and countermeasures.

Uploaded by

umakalaimani
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

23IC24E CYBER SECURITY AND ETHICAL HACKING L T P C 3 0 0 3

COURSE OUTCOMES
CO1: choose the appropriate tools to support an ethical hack and defend the major issues.
CO2: interpret the results of a controlled attack in the area of cyber security
CO3: experience the role of politics, inherent and imposed limitations and metrics for planning of a test
CO4: comprehend the dangers associated with penetration testing
INTRODUCTION TO ETHICAL HACKING 9

Hacking Impacts, The Hacker Framework: Planning the test, Sound Operations, Reconnaissance,
Enumeration, Vulnerability Analysis, Exploitation, Final Analysis, Deliverable, Integration. Information
Security Models: Computer Security, Network Security, Service Security, Application Security, Security
Architecture Information Security Program: The Process of Information Security, Component Parts of
Information Security Program, Risk Analysis and Ethical Hacking.

THE BUSINESS PERSPECTIVE 9

Business Objectives, Security Policy, Previous Test Results, Business Challenges. Planning for a Controlled
Attack: Inherent Limitations, Imposed Limitations, timing is Everything, Attack Type, Source Point,
Required Knowledge, Multi-Phased Attacks, Teaming and Attack Structure, Engagement Planner, The
Right Security Consultant, The Tester, Logistics, Intermediates, Law Enforcement.

PREPARING FOR A HACK 9

Technical Preparation, Managing the Engagement. Reconnaissance: Social Engineering, Physical Security,
Internet Reconnaissance.

ENUMERATION 9

Enumeration Techniques, Soft Objective, Looking Around or Attack, Elements of Enumeration, Preparing
for the Next Phase. Exploitation: Intutive Testing, Evasion, Threads and Groups, Operating Systems,
Password Crackers, RootKits, applications, Wardialing, Network, Service and Areas of Concern.
DELIVERABLE 9

The Deliverable, The Document, Overall Structure, Aligning Findings, Presentation. Integration:
Integrating the Results, Integration Summary, Mitigation, Defense Planning, Incident Management,
Security Policy.

L: 45; TOTAL: 45 PERIODS

REFERENCES

1. EC-Council, “Ethical Hacking and Countermeasures Attack Phases”, Cengage Learning, 2016.

2. James S. Tiller, “The Ethical Hack: A Framework for Business Value Penetration Testing”, Auerbach
Publications, CRC Press, 2004.

3. Michael Simpson, Kent Backman, James Corley, “Hands-On Ethical Hacking and Network Defense”,
Cengage Learning, 2010.

You might also like