Back close

Course Detail

Course Name Offensive Cyber Security
Course Code 24CS742
Program M. Tech. in Computer Science & Engineering
Semester Electives
Credits 3
Campus Coimbatore, Bengaluru, Nagercoil, Chennai

Syllabus

Introduction to Offensive networking security, Penetration testing, and Ethical hacking–Types of PenetrationTesting: Network,Web Application,Wireless network, and Physical, Social Engineering.

Testing Methodologies: Blackbox / Whitebox– Intelligence Gathering: Passive Open-Source Information Gathering: OSINT Framework, Email Harvesting, Password Dumps, Maltego

Active Information Gathering: Port Scanning with Nmap, TCP/ UDP Scanning–Threat Modeling– Common Vulnerability Analysis: using Nessus, Banner Grabbing–Web Application Assessment: Exploitation, Burp Suite, SQL Injection, Cross-Site Scripting (XSS)–CVEs, National Vulnerability Database, CWE/SANSTOP25 Most Dangerous Software Errors, CIS:20 Critical Security Controls.

Buffer Overflows: Windows, Linux– Client- Side Attacks–Antivirus Circumvention– Privilege Escalation– Password Attacks– Active –Meta Sploit Framework–Red Team vsBlueTeam, Case Study: Mobile phone security anaylsis, rainbow crack project,, security configuration.

Summary

Pre-Requisite(s): Basic knowledge of Networking protocols,Windows & Linux commands,Tools such as Bash Shell Scripting and Wireshark, SQL Commands, Oracle or MySQL Databases
Course Type: Lab

Course Objectives and Outcomes

Course Objectives

  • Analyze and evaluate suspicious entities leverage to steal data.
  • Install, configure, utilize, and troubleshoot various offensive cyber security tools and software for proactive security strategies.

Course Outcomes

CO1: Understand the basic principles and features of Offensive Security and PenetrationTesting

CO2: Apply penetration testing strategies on various applications to evaluate and enhance these security of software systems

CO3: Identify and exploit common web and database vulnerabilities using tools

CO4: Comprehend Common Vulnerability Exposures, Common Weakness Enumeration of SANS Institute, and Critical Security Controls

CO5: Run Cyber Attacks, tests and probes in a practical context

CO-PO Mapping

CO PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 2 1 2 3
CO2 2 3 3 3 2 3
CO3 3 3 2 3 2 2
CO4 3 3 2 3 2 2

Evaluation Pattern: 70/30

Assessment

Internal

Weightage

External

Weightage

Midterm Examination

20

 

Continuous Assessment (Theory)

10

 

Continuous Assessment (Lab)

40

 

End Semester

 

30

Note: Continuous assessments can include quizzes, tutorials, lab assessments, case study and project reviews. Midterm and End semester exams can be a theory exam or lab integrated exam for two hours

Text Books/ References

  1. Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali by OccupyTheWeb, Kindle Edition, No Starch Press, 2018.
  2. Georgia Weidman, Penetration Testing: A Hands-On Introduction to Hacking, 1st Edition, Kindle Edition. No Starch Press, 2014.
  3. Dafydd Stuttard, Marcus Pinto, The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, 2nd Edition, Wiley.com, 2011.
  4. ames Forshaw, Attacking Network Protocols: A Hacker’s Guide to Capture, Analysis, and Exploitation, Kindle Edition, No Starch Press, 2017.
  5. Jon Erickson, Hacking: The Art of Exploitation, 2nd Edition, No Starch Press, 2008.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now