To take an ethical hacking course, you may need a bachelor's degree in computer science or information technology. You may also need relevant work experience or an advanced diploma in network security.
Ethical hacking courses teach students how to identify and fix vulnerabilities in systems and networks. They can help you develop skills in cybersecurity, computer systems, and web applications.
On completion of this course the student will be able to:
1. Outline the vulnerabilities in a system or network.
2. Analyze and critically evaluate techniques used to break into an insecure web application
and identify relevant countermeasures.
3. Demonstrate a critical evaluation of an advanced security topic with an independent
project.
4. Critically evaluate the potential counter measures to advanced hacking techniques.
5. Explain computer forensic fundamentals.
Module I
Ethical Hacking−Overview-Hacker types-Threats and attacks ,Vulnerabilities, Phases of hacking-
Reconnaissance-Scanning-Maintaining Access with Backdoors and Rootkits-Clearing traces.
System Hacking-Hacking Windows-Hacking UNIX-Remote connectivity and VoIP Hacking.
Software Hacking-Hacking code-Web Hacking-Hacking the Internet User.
Module II
Password Hacking-Dictionary attack-Hybrid Dictionary attack-Brute force attack-Rainbow tables.
A study on various attacks– Input validation attacks – SQL injection attacks – Buffer overflow
attacks - Privacy attacks.
Module III
TCP / IP – IP Spoofing, port scanning, DNS Spoofing. Dos attacks – SYN attacks, Smurf attacks,
UDP flooding, DDOS – Models. Batch File Programming.
Module IV
Overview of computer forensics technology: computer forensics services-Data seizure-Data
duplication and preservation-Data recovery-Document searches-Media conversion-Expert witness
services-Computer evidence service options-Other miscellaneous services.
References:
1. Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray
and George Kurtz, McGraw-Hill, 2005.
2. Patrick Engebretson, The Basics of Hacking and Penetration Testing, Elsevier, 2013.
3. Network intrusion alert: an ethical hacking guide to intrusion detection, Ankit Fadia, Manu
Zacharia, Thomson Course Technology PTR, 2007.
4. Ethical Hacking, Thomas Mathew, OSB Publisher, 2003.
5. Network Security and Ethical Hacking, Rajat Khare, Luniver Press, 2006.
6. John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, 2nd Edition.
As the Super Admin of our platform, I bring over a decade of experience in managing and leading digital transformation initiatives. My journey began in the tech industry as a developer, and I have since evolved into a strategic leader with a focus on innovation and operational excellence. I am passionate about leveraging technology to solve complex problems and drive organizational growth. Outside of work, I enjoy mentoring aspiring tech professionals and staying updated with the latest industry trends.
No Review found