Ethical Hacking
CO1: Introduction to Ethical Hacking: Hacking Methodology, Process of Malicious Hacking, and Footprinting and scanning: Footprinting, scanning. Enumeration: Enumeration. System Hacking and Trojans: System Hacking, Trojans, and Black Box Vs. White Box Techniques.
PPT | Material | Sample Questions
CO2: Hacking Methodology: Denial of Service, Sniffers, Session Hijacking and Hacking Web Servers: Session Hijacking, Hacking Web Servers. Web Application Vulnerabilities and Web Techniques Based Password Cracking: Web Application Vulnerabilities, Web-Based Password Cracking Techniques.
PPT | Material | Sample Questions
CO3: Web and Network Hacking: SQL Injection, Hacking Wireless Networking, Viruses, Worms and Physical Security: Viruses and Worms, Physical Security. Linux Hacking: Linux Hacking. Evading IDS and Firewalls: Evading IDS and Firewalls.
PPT|Material | Sample Questions
CO4: Report writing & Mitigation: Introduction to Report Writing & Mitigation, requirements for low-level reporting & high-level reporting of Penetration testing results, Demonstration of vulnerabilities, and Mitigation of issues identified including tracking.
PPT |Material | Sample Questions | Other Source1 Sources2
Very Important Questions cum Long Answer Questions
Good sources for Ethical Hacking
Comments