Preloader

Query +91 (0)484 - 2972720

Basic Horizontal Scrolling

Online registration for admission to PG programs in Arts and Science Colleges affiliated to MG University has started. എം ജി സർവകലാശാലയോട് അഫിലിയേറ് ചെയ്തിട്ടുള്ള ആർട്സ് ആൻഡ് സയൻസ് കോളേജുകളിലെ പി ജി പ്രോഗ്രാമുകളിലേക്കുള്ള പ്രവേശനത്തിനുള്ള ഓൺലൈൻ രജിസ്ട്രേഷൻ ആരംഭിച്ചു.PGCAP2025 - Online registration closes on 31st May 2025. എം ജി ബിരുദ ഏകജാലകം: ഓൺലൈൻ രജിസ്‌ട്രേഷൻ ആരംഭിച്ചു.ഓൺലൈൻ രജിസ്‌ട്രേഷനുള്ള സൗകര്യം 2025 മെയ് 31 വരെ ലഭ്യമായിരിക്കുന്നതാണ്.

Basic Horizontal Scrolling

Siena College of Professional Studies - An ISO 9001:2015 Certified Institution, NAAC Accredited with Grade B++ (CGPA of 2.85) - Approved by Govt. of Kerala & AICTE.

ETHICAL HACKING

SYLLABUS

ETHICAL HACKING

 

Class: B.com Finance And Taxation Model 1                                     

Duration:36 Hours

Programme Code: SCPS/COM/EH/2019-2022

COURSE CONTENTS

Module 1: Introduction to Ethical Hacking

Understanding the fundamentals of ethical hacking

 Differentiating between ethical hacking and illegal hacking

 Legal and ethical considerations in ethical hacking

 Overview of common hacking techniques and methodologies

 Introduction to tools and resources used in ethical hacking [7 Hours]

 

Module 2: Footprinting and Reconnaissance

 Understanding footprinting and reconnaissance methodologies

 Passive and active reconnaissance techniques

 Information gathering through open-source intelligence (OSINT)

 Using reconnaissance tools and techniques to gather information about targets

 Ethical considerations in footprinting and reconnaissance activities [7 Hours]

 

Module 3: Scanning and Enumeration

Overview of scanning and enumeration in ethical hacking

 Understanding different types of scans: TCP, UDP, SYN, etc.

 Enumerating systems, services, and applications

 Identifying vulnerabilities and weaknesses through scanning and enumeration     

 Using scanning and enumeration tools effectively and ethically [8Hours]

Module 4: Vulnerability Assessment and Exploitation

 Introduction to vulnerability assessment and exploitation

 Identifying vulnerabilities in systems, networks, and applications

 Understanding common vulnerabilities and their impact

 Exploiting vulnerabilities responsibly and ethically

 Mitigating vulnerabilities and securing systems against exploitation [7 Hours]

Module 5: Post-Exploitation and Reporting

Understanding post-exploitation techniques and methodologies

 Maintaining access to compromised systems

 Covering tracks and maintaining anonymity

 Ethical reporting and disclosure of vulnerabilities

 Writing comprehensive and professional penetration testing reports. [7 Hours]

If you Have Any Query Call Us On +91 (0)484 - 2972720