This course demonstrates the ethical use of various "white hat" cyber penetration testing tools and techniques consistent with Ethical Hacking. It covers attacks, defense basics, race conditions, format abuses, secure coding techniques, vulnerability discovery. Additionally, it introduces the fuzzing techniques to obtain security flaws in program input, protocols, and penetration testing techniques. It will cover detailed methodologies and techniques to identify vulnerabilities, exploits, and assess security risks to networks, operating systems, and applications.
Undergraduate 132 CRs
Rafay Baloch, Ethical Hacking and Penetration Testing Guide, Auerbach Publications
content serial | Description |
---|---|
1 | Introduction to Ethical Hacking and Penetration Testing |
2 | Overview of Cyber Attacks |
3 | Defensive Measures and Incident Response |
4 | Secure Coding Practices |
5 | Race Conditions and Format String Vulnerabilities |
6 | Vulnerability Discovery Techniques |
7 | 7th week Assessment |
8 | Exploitation Techniques |
9 | Fuzzing Techniques |
10 | Penetration Testing Methodologies |
11 | Network Security Assessment |
12 | 12th week Assessment |
13 | Operating System Security Assessment |
14 | Application Security Assessment |
15 | Project Presentations |
Start your application