Degree Course from Bangalore University
Ethical Hacking & Cloud Computing
Sharing knowledge in computer science to create successful, ethical and effective problem solvers for our society
To provide students with experiential learning opportunities to help them acquire new knowledge to meet the growing demands of a world that keeps changing rapidly
About the Course
The Department of Computer Science at ST PAULS COLLEGE offers professional courses in Computer Application. In this age of modern Technology and digitalization, adequate knowledge about information technology and Applications is indispensable as it helps individuals to have distinct advantages over the others. Bachelor of Computer Applications is a three-year undergraduate programme that focuses on Information Technology and computer applications. The course imparts knowledge about different Computer Applications and how to address and solve problems that arise from various computer applications. The course includes subjects such as core programming languages such as Java, OOPS, Machine Learning, Computer Architecture data structure, Networking and others. BCA provides various opportunities to the students who wish to pursue their career in IT and software. The students gain knowledge on topics like Programming Languages, Hardware and Software, Computer Networks, World Wide Web, Database Management, Software Engineering, etc. A candidate shall be awarded the Bachelor’s Degree in Computer Applications (B.C.A.) after the successful completion of the course that lasts for three years and an Honours in B.C.A. after 4 years.
Software Publishers, Information System Managers, Database Administrators, System Analysts, Chief Information Officers, Computer Graphics, Internet Technologies, Accounting Applications, Personal Information Management, Systems Analysts, Web Developers, Network Administrators, System Managers, Computer Programmers, Software Developers, Software Testers, etc.
- TECHNOVATION – Intra Collegiate IT Fest
- ORACLE – Inter Collegiate ITFest
- TRIATHLON – Intra Departmental Collegiate Fest
- APEIRON – Guest lecture from industry experts
- Industry visits and Internships
- National/International Conferences
- Hands on Skill Development Workshops
- Monthly Seminars And Webinars
- Awareness Programs on Emerging Technologies
- Outreach Activities
- Advanced Computer Lab
- Research Assistance, Paper Presentations, Fests, etc.
- Placement Training – interview skill, group discussion, resume preparation
- Placement Assistance – campus placement drive and campus interview
Specialisations – Ethical Hacking
Ethical Hacking is one of the most popular courses with the increase in people’s interest in internet security and ways for keeping one’s personal security safe and secure from different people. Ethical Hacking falls under various branches including Cyber Security courses, Networking, CSE, Information Technology, etc. The syllabus for Ethical Hacking Course provided by ST PAULS COLLEGE includes topics that are common in different Ethical Hacking Courses like Cyber Ethics-Hacking Introduction, Information Gathering, Scanning and many more.
Ethical Hacking course also covers tools and techniques that are used by hackers and penetration testers.
This Seminar will educate the student into an interactive environment where they will be shown about how to scan, test, hack and secure their systems. Students will understand how our defense measure works and then scan their networks & attack their own. On completion of the session students will be able to identify the different threats posed by hackers and other malicious attackers and how to protect our network & devices from those attacks.
At the conclusion of course students are able to:
- Understand the core foundations of ethics in regards to computer security
- Learn about the hacker mindset and the history of hackers
- Understand basic networking and security technologies
- Gain a basic understanding of security policy
- Learn about basic system defense infrastructure.
Ethical Hacking Syllabus
Duration: 60 hrs theory + 30 hrs practical + 10 Project/Self-Study
PRACTICALS - ETHICAL HACKING
The Practical modules are designed for providing a comprehensive ethical hacking and penetration testing training and covers various topics. Here is a list of topics that are covered.
- Malware Threats
- Session Hijacking
- System Hacking
- Hacking Wireless Networks
- Hacking Web Servers
- SQL Injection
- Cloud Computing
UNIT 1: INTRODUCTION
Information Security Overview – Information Security Threats and Attack Vectors – Hacking Concept Ethical Hacking Concepts – Information Security Controls – Penetration Testing Concepts – Information Security Laws and Standards.
UNIT 2: FOOTPRINTING AND RECONNAISSANCE
Footprinting Concepts – Footprinting through Search Engines – Footprinting through Web Services – Footprinting through Social Networking Sites – Website Footprinting – Email Footprinting – Competitive Intelligence – Whois Footprinting – DNS Footprinting – Network Footprinting – Footprinting Through Social Engineering – Footprinting Tools – Footprinting Countermeasures – Footprinting Penetration Testing
UNIT 3: SCANNING NETWORKS & ENUMERATION
Network Scanning Concepts – Scanning Tools – Scanning Techniques – Scanning Beyond IDS and Firewall – Banner Grabbing – Draw Network Diagrams – Scanning Pen Testing.
UNIT 4: CRYPTOGRAPHY
Cryptography Concepts – Encryption Algorithms – Cryptography Tools – Public Key Infrastructure – Email Encryption Disk Encryption Cryptanalysis – Countermeasures
UNIT 5: ATTACKS, HIJACKING AND PHISHING
- Key issues plaguing the information security world, incident management process, and penetration testing.
- Various types of footprinting, footprinting tools, competitive intelligence gathering and countermeasures.
- Network scanning techniques and scanning countermeasures.
- Enumeration techniques and enumeration countermeasures.
- System hacking methodology, steganography, steganalysis attacks, and covering tracks.
- Windows OS Security. Hacking Into System by Changing Passwords & Getting Access to System by Elevating Privileges and to bypass The Windows Security.
- Operating System Attacks, Misconfiguration Attacks, Application-Level Attacks, Examples of Application-Level Attacks, Shrink Wrap Code Attacks.
- Different types of Trojans, Trojan analysis, and Trojan countermeasures.
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
- Virus creation in computer using Batch file programming, HTML & VB Script.
- Packet sniffing techniques and how to defend against sniffing.
- Social Engineering techniques, identify theft, and social engineering countermeasures.
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
- Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit.
- The cross-site scripting (XSS) vulnerability to exploit client-side web application vulnerability.
- Web server Attacks – Directory Traversal Attacks, HTTP Response Splitting Attack, Web Cache Poisoning Attack, HTTP Response Hijacking, SSH Brute force Attack, Web server Password Cracking, Web Application Attacks.
- Hacking: The Art of Exploitation is a book written by Jon Erickson.
- The Basics of Hacking and Penetration Testing is written by Patrick Engebretson.
- Penetration Testing, a security expert, researcher, and trainer is written by Georgia Weidman.
- Hacking: Computer Hacking, Security Testing is a book written by Gary Hall.
Specialisations – Cloud Computing
Cloud Computing is the on-demand course for the industry, the course teaches storing and retrieving data globally. Softlogic Systems provides the best practice on cloud computing usage to handle big data of an organization with the remote server access. We offer preeminent placement assistance and worthwhile certification after the successful course completion along with adequate hands-on experiences based on our industry-relevant cloud computing course syllabus to perform well in the companies from the beginning.
- The course presents a top-down view of cloud computing, from applications and administration to programming and infrastructure.
- Its main focus is on parallel programming techniques for cloud computing and large-scale distributed systems which form the cloud infrastructure.
- Overview of cloud computing, cloud systems, Cloud Service Administration, Accessing the Cloud parallel processing in the cloud, distributed storage systems, virtualization, cloud standards, and Migrating to the Cloud.
- Knowledge about the state-of-the-art solutions for cloud computing developed by Google, Amazon, Microsoft, Yahoo, VMWare, etc. Students will also apply what they learn in one programming assignment and one project executed over Amazon Web Services.
- To enable the student to analyse the trade-offs between deploying applications in the cloud and over the local infrastructure.
- Compare the advantages and disadvantages of various cloud computing platforms.
- Deploy applications over commercial cloud computing infrastructures such as Amazon Web Services, Windows Azure, and Google App Engine.
- Program data intensive parallel applications in the cloud.
Cloud Computing Syllabus
Duration: 72 hrs theory + 30 hrs practical
UNIT I: INTRODUCTION
Introduction- Objectives, From collaborative to the Cloud – A short history Client – Server Computing, Peer-to-Peer Computing, Distributed Computing, Collaborative Computing, Cloud Computing, Functioning of Cloud Computing, Cloud Architecture, Cloud Storage, Cloud Services, Industrial Applications .Business Values, Introduction Objectives, Service Modelling, Infrastructure Services, Platform Services, Software Services – Software as service modes- Massively scaled software as a service- Scale of Economy, Management and Administration.
UNIT II: CLOUD SERVICE ADMINISTRATION
Cloud Service Administration- Service Level Agreements and Monitoring Support Services- Accounting Services, Resource Management- IT Security Performance Management- Provisioning- Service Management, Untangling
Software Dependencies. Cloud Computing Technology- Introduction-Objectives, Clients – Mobile – Thin – Thick, Security – Data Linkage – Offloading Work – Logging – Forensics – Development – Auditing, Network- Basic Public Internet the Accelerated Internet- Optimised Internet Overlay- Site-to-Site VPN- Cloud Providers- Cloud Consumers – Pipe Size- Redundancy, Services- Identity Integration- Mapping- Payments- Search.
UNIT III: ACCESSING THE CLOUD
Introduction-Objectives, Platforms- Web Application Framework- Web Hosting Services- Proprietary Methods, Web Applications- API’s in Cloud Computing, Browsers for Cloud Computing- Internet Explorer- Mozilla Firefox- Safari Chrome. Data Management- Introduction- Objectives, Data Security- Data Location- Data Control- Securing data for transport, Scalability and Cloud Services- Large Scale Data Processing- Databases and Data Stores- Data Archival.
UNIT IV: INFORMATION STORAGE IN CLOUD COMPUTING
Introduction- Objectives, Storage as a Service, Storage Providers- Amazon Simple Storage Service- Nirvana- Google Big table Data store- Mobile Me- Live Mesh, Storage Security, Merits and Demerits of Storage. Defining a private cloud Public, Private, and Hybrid Clouds – A Comparison, Examining the Economics of the private cloud
UNIT V: CLOUD COMPUTING STANDARDS
Introduction- Objectives, Best Practices and Standards, Practical Issues Interoperability- Portability- Integration- Security, Standards Organizations and Groups- Cloud Security Alliance- Distributed Management Task Force (DMTF)- National Institute of Standards and Technology (NIST)- Open Cloud Consortium (OCC)- Open Grid Forum (OGF)- Object Management Group (OMG)- Storage Networking Industry Association (SNIA)- Cloud Computing Interoperability Forum (CCIF)- Vertical Groups. Migrating to the Cloud- Introduction Objectives, Cloud Services for individuals- Available Services – Sky tap Solution, Cloud Services Aimed at the mid – market, Enterprise Class Cloud Offerings
Unit VI: CLOUD CRYPTOGRAPHY
Pre-encrypted data, End-to-end encryption, File encryption, Full disk encryption, data on the cloud be secured by Cryptography, Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Advanced Encryption Standard (AES).
- Cloud Computing: Concepts, Technology & Architecture by Thomas Earl.
- Cloud computing from beginning to End by Ray J. Rafaels
- Building the infrastructure for cloud security by RaghuRamYeluri
- Architecting the Cloud: Design Decisions for cloud computing service models by Michael Jokai
- The Great Cloud Migration by Michael C. Daconta.