Ethical Hacking

Ethical Hacking in Indian Institute of Technology, Kharagpur

Beginner 0(0 Ratings) 0 Students enrolled
Created by IIT Kharagpur Staff Last updated Thu, 24-Feb-2022 English


Ethical Hacking free videos and free material uploaded by Indian Institute of Technology, Kharagpur (IIT Kharagpur). This session contains about Ethical Hacking Updated syllabus , Lecture notes , videos , MCQ , Privious Question papers and Toppers Training Provided Training of this course. If Material not uploaded check another subject

Syllabus / What will i learn?

Week 1: Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.Week 2: IP addressing and routing. TCP and UDP. IP subnets.Week 3: Routing protocols. IP version 6.Week 4: Demonstration Session:: Vulnerability assessment: OpenVAS, Nessus, etc. System hacking: password cracking, penetration testing, etc.Week 5: Demonstration Session: Social engineering attacks. Malware threats, penetration testing by creating backdoors.Week 6: Introduction to cryptography, private-key encryption, public-key encryption.Week 7: Cryptographic hash functions, digital signature and certificate, applications.Week 8: Steganography, biometric authentication, network-based attacks, DNS and Email security.Week 9: Demonstration Session:: Sniffing: Wireshark, ARP poisoning, DNS poisoning. Hacking wireless networks, Denial of service attacks.Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions, hardware trojans.Week 11:Demonstration Session:: Hacking web applications: vulnerability assessment, SQL injection, cross-site scripting.Week 12: Case studies: various attacks scenarios and their remedies.



Curriculum for this course
0 Lessons 00:00:00 Hours
+ View more
Description

Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them. There will be hands-on demonstrations that will be helpful to the participants. The participants are encouraged to try and replicate the demonstration experiments that will be discussed as part of the course.INTENDED AUDIENCE:Computer Science and Engineering / Information Technology / Electronics and Communication / Electrical EngineeringPRE-REQUISITES: Basic concepts in programming and networkingINDUSTRY SUPPORT: TCS, Wipro, CTS, Google, Microsoft, Qualcomm

You need online training / explanation for this course?
1:1 Online Training / Explanation Fee: 1 /- Month

1 to 1 Online Training contact instructor for demo :


+ View more

Other related courses
Updated Wed, 22-Apr-2020
26 Lessons
5 Free
Updated Wed, 22-Apr-2020
11 Lessons
0 Free
Updated Wed, 22-Apr-2020
29 Lessons
0 Free
Updated Sun, 20-Sep-2020
24 Lessons
0 ₹ 199
Updated Wed, 24-Feb-2021
35 Lessons
0 Free
Updated Wed, 22-Apr-2020
20 Lessons
0 Free
Updated Wed, 22-Apr-2020
38 Lessons
0 Free
Updated Thu, 30-Apr-2020
10 Lessons
0 Free
Updated Thu, 30-Apr-2020
43 Lessons
0 Free
About the instructor
  • 0 Reviews
  • 8 Students
  • 351 Courses
+ View more
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews

Material price :

Free

1:1 Online Training Fee: 1 /- Month
Contact instructor for demo :