B.Tech. VII Semester AIM
2024-25
By
Dr. Loshma Gunisetti,
Professor and Head , AIML Dept.
EH Unit II - Dr. G. Loshma 1
,Text Book:
CEH official Certified Ethical Hacking Review Guide, Wiley
India Edition.
Reference Books:
1. Hacking Exposed Web 2.0, by Rich Annings, Himanshu
Dwivedi, Zane Lackey, Tata McGraw Hill Edition.
2. Ethical Hacking & Network Defense, Michael T. Simpson,
Cengage Learning
3. Hacking Exposed Windows, Joel Scambray, CISSP, Stuart
Mcclure, CISSP, Third Edition, Tata McGraw Hill Edition.
4. Hacking Exposed Window server 2003, Joel Scambray
Stuart McClure, Tata McGraw Hill Edition.
EH Unit II - Dr. G. Loshma 2
,Course Outcomes
After successful completion of this course, the student will be able to:
Knowledge
CO Course Outcomes
Level
1 Discuss ethical considerations of Hacking. K2
Assess an environment using Footprinting and Social
2 K3
Engineering methods.
Discuss various techniques and tools used in Network Scanning
3 K3
and characteristics in Enumeration phase
Demonstrate techniques and tools used in System Hacking and
4 K3
different Malwares.
Illustrate counter measures to Denial-Of-Service, Session
5 K3
Hijacking.
EH Unit II - Dr. G. Loshma 3
, Syllabus
EH Unit II - Dr. G. Loshma 4