Syllabus Ethical Hacking - (CCS344) UNIT I INTRODUCTION Ethical Hacking Overview - Role of Security and Penetration Testers - Penetration-Testing Methodologies - Laws of the Land - Overview of TCP/IP- The Application Layer - The Transport Layer - The Internet Layer - IP Addressing - Network and Computer Attacks - Malware - Protecting Against Malware Attacks - Intruder Attacks - Addressing Physical Security. (Chapter - 1) UNIT II FOOT PRINTING, RECONNAISSANCE AND SCANNING NETWORKS Footprinting Concepts - Footprinting through Search Engines, Web Services, Social Networking Sites, Website, Email - Competitive Intelligence - Footprinting through Social Engineering - Footprinting Tools - Network Scanning Concepts - Port-Scanning Tools - Scanning Techniques - Scanning Beyond IDS and Firewall. (Chapter - 2) UNIT III ENUMERATION AND VULNERABILITY ANALYSIS Enumeration Concepts - NetBIOS Enumeration - SNMP, LDAP, NTP, SMTP and DNS Enumeration - Vulnerability Assessment Concepts - Desktop and Server OS Vulnerabilities - Windows OS Vulnerabilities - Tools for Identifying Vulnerabilities in Windows - Linux OS Vulnerabilities - Vulnerabilities of Embedded Oss. (Chapter - 3) UNIT IV SYSTEM HACKING Hacking Web Servers - Web Application Components - Vulnerabilities - Tools for Web Attackers and Security Testers Hacking Wireless Networks - Components of a Wireless Network - Wardriving - Wireless Hacking - Tools of the Trade. (Chapter - 4) UNIT V NETWORK PROTECTION SYSTEMS Access Control Lists - Cisco Adaptive Security Appliance Firewall - Configuration and Risk Analysis Tools for Firewalls and Routers - Intrusion Detection and Prevention Systems - Network-Based and Host-Based IDSs and IPSs - Web Filtering - Security Incident Response Teams - Honeypots. (Chapter - 5)