YoVDO

Ethical Hacking

Offered By: Indian Institute of Technology, Kharagpur via Swayam

Tags

Network Security Courses Cryptography Courses Ethical Hacking Courses Hardware Security Courses Cyber Attacks Courses System Security Courses Vulnerability Assessment Courses

Course Description

Overview

Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them. There will be hands-on demonstrations that will be helpful to the participants. The participants are encouraged to try and replicate the demonstration experiments that will be discussed as part of the course.INTENDED AUDIENCE:Computer Science and Engineering / Information Technology / Electronics and Communication / Electrical EngineeringPRE-REQUISITES: Basic concepts in programming and networkingINDUSTRY SUPPORT: TCS, Wipro, CTS, Google, Microsoft, Qualcomm

Syllabus

Week 1: Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.Week 2: IP addressing and routing. TCP and UDP. IP subnets.Week 3: Routing protocols. IP version 6.Week 4: Demonstration Session:: Vulnerability assessment: OpenVAS, Nessus, etc. System hacking: password cracking, penetration testing, etc.Week 5: Demonstration Session: Social engineering attacks. Malware threats, penetration testing by creating backdoors.Week 6: Introduction to cryptography, private-key encryption, public-key encryption.Week 7: Cryptographic hash functions, digital signature and certificate, applications.Week 8: Steganography, biometric authentication, network-based attacks, DNS and Email security.Week 9: Demonstration Session:: Sniffing: Wireshark, ARP poisoning, DNS poisoning. Hacking wireless networks, Denial of service attacks.Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions, hardware trojans.Week 11:Demonstration Session:: Hacking web applications: vulnerability assessment, SQL injection, cross-site scripting.Week 12: Case studies: various attacks scenarios and their remedies.


Taught by

Prof. Indranil Sen Gupta

Tags

Related Courses

Climate change and Indigenous People and local communities
Universitat Autònoma de Barcelona (Autonomous University of Barcelona) via Coursera
Climate Adaptation for Human Health
Yale University via Coursera
Fundamentos del Internet de las cosas (IoT): Seguridad I
Galileo University via edX
MSc Cyber Security
Coventry University via FutureLearn
Metasploit Training Course by Cybrary
Cybrary