BSC

Degree Course from Bangalore University

Ethical Hacking & Cloud Computing

Vision

Sharing knowledge in computer science and psychology to create successful, ethical and effective problem solvers for our society

Mission

To provide students with experiential learning opportunities to help them acquire new knowledge to meet the growing demands of a world that keeps changing rapidly

About the Course

Computer Science

Our college offers courses in computer science at an undergraduate level to respond to the rising demand in this field owing to the rapid growth of IT and software industries in the country. A career in Computer Science has been proved lucrative and rewarding since last decade. Students of computer science are trained not only in the use of various software but also have the opportunity to acquire knowledge of operating systems, programming language, data base, etc. With the opening of many software and IT companies in India, the job opportunities for trained professionals have increased considerably. 

Psychology

The course focuses on the scientific study of the human mind and how it dictates and influences our behavior from communication and memory to thought and emotion. The objective is to understand what makes people think and how this understanding can help them address many of the problems and issues in society today. The course focuses on the study of human behavior and the thoughts, feelings, and motivations behind it through observation, measurement and testing in order to form conclusions that are based on sound scientific methodology.

Job Opportunities

Psychologist, Psychiatrist, Counsellor, Therapist, Lecturer, NGO, Programme Developer and Analyst, Artist, Designer, Engineer, Systems Manager, IT Professional, Public Administrator, Researcher Scholar, Public Relations Officer, etc.

Apply Now

Program Highlights

  • IKANOS – Intra Departmental Humanities & Science Fest (UG & PG)
  • HUMANZA – Inter Collegiate Humanities & Science Fest
  • MUGSHOT – National Level Photography Exhibition
  • BONSAI – National Level Short Film Festival
  • MEDIA BASH – PU/12th Media Fest and Panel Discussion
  • Seminar and workshop series
    • Journalism: TATTVA MANDALA – Where thought and wisdom converge
    • Psychology: YĀNA – a journey towards a better life
    • English: LEND ME YOUR EARS
    • Political Science: LYCEUM
    • Languages: PRABUDH CHARCHA
  • PAULA PATRIKA – In house fortnightly newsletter
  • COSMOS – In-house half yearly magazine
  • DRISHTI – YouTube channel for practical learning
  • ST PAULS TV – In house television channel for practical learning
  • Visit to NIMHANS brain museum
  •  Well-equipped psychology, journalism and computer labs
  • Industry visits and Internships
  • Creative and enriching Outreach activities
  • Interaction with authors, poets, psychologists, journalists and industry experts
  • Coaching for Competitive Exams
  • Advanced Edit Lab and Media Lab
  • Research Assistance, Paper Presentations, Fests, etc.
  • Placement training – interview skill, group discussion, resume preparation
  • Placement Assistance – campus placement drive and campus interview

Specialisations  – Ethical Hacking

Ethical Hacking is one of the most popular courses with the increase in people’s interest in internet security and ways for keeping one’s personal security safe and secure from different people. Ethical Hacking falls under various branches including Cyber Security courses, Networking, CSE, Information Technology, etc. The syllabus for Ethical Hacking Course provided by ST PAULS COLLEGE includes topics that are common in different Ethical Hacking Courses like Cyber Ethics-Hacking Introduction, Information Gathering, Scanning and many more.

Ethical Hacking course also covers tools and techniques that are used by hackers and penetration testers.

Program Objectives

This Seminar will educate the student into an interactive environment where they will be shown about how to scan, test, hack and secure their systems. Students will understand how our defense measure works and then scan their networks & attack their own. On completion of the session students will be able to identify the different threats posed by hackers and other malicious attackers and how to protect our network & devices from those attacks.

Learning Outcome

At the conclusion of course students are able to:

  • Understand the core foundations of ethics in regards to computer security
  • Learn about the hacker mindset and the history of hackers
  • Understand basic networking and security technologies
  • Gain a basic understanding of security policy
  • Learn about basic system defense infrastructure.

Ethical Hacking Syllabus

Duration: 60 hrs theory + 30 hrs practical + 10 Project/Self-Study

PRACTICALS - ETHICAL HACKING

The Practical modules are designed for providing a comprehensive ethical hacking and penetration testing training and covers various topics. Here is a list of topics that are covered.

  • Malware Threats
  • Session Hijacking
  • System Hacking
  • Sniffing
  • Hacking Wireless Networks
  • Hacking Web Servers
  • SQL Injection
  • Cryptography
  • Cloud Computing

UNIT 1: INTRODUCTION

Information Security Overview – Information Security Threats and Attack Vectors – Hacking Concept Ethical Hacking Concepts – Information Security Controls – Penetration Testing Concepts – Information Security Laws and Standards.

UNIT 2: FOOTPRINTING AND RECONNAISSANCE

Footprinting Concepts – Footprinting through Search Engines – Footprinting through Web Services – Footprinting through Social Networking Sites – Website Footprinting – Email Footprinting – Competitive Intelligence – Whois Footprinting – DNS Footprinting – Network Footprinting – Footprinting Through Social Engineering – Footprinting Tools – Footprinting Countermeasures – Footprinting Penetration Testing

UNIT 3: SCANNING NETWORKS & ENUMERATION

Network Scanning Concepts – Scanning Tools – Scanning Techniques – Scanning Beyond IDS and Firewall – Banner Grabbing – Draw Network Diagrams – Scanning Pen Testing.

UNIT 4: CRYPTOGRAPHY

Cryptography Concepts – Encryption Algorithms – Cryptography Tools – Public Key Infrastructure – Email Encryption Disk Encryption Cryptanalysis – Countermeasures

UNIT 5: ATTACKS, HIJACKING AND PHISHING

  • Key issues plaguing the information security world, incident management process, and penetration testing.
  • Various types of footprinting, footprinting tools, competitive intelligence gathering and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Windows OS Security. Hacking Into System by Changing Passwords & Getting Access to System by Elevating Privileges and to bypass The Windows Security.
  • Operating System Attacks, Misconfiguration Attacks, Application-Level Attacks, Examples of Application-Level Attacks, Shrink Wrap Code Attacks.
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Virus creation in computer using Batch file programming, HTML & VB Script.
  • Packet sniffing techniques and how to defend against sniffing.
  • Social Engineering techniques, identify theft, and social engineering countermeasures.
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit.
  • The cross-site scripting (XSS) vulnerability to exploit client-side web application vulnerability.
  • Web server Attacks – Directory Traversal Attacks, HTTP Response Splitting Attack, Web Cache Poisoning Attack, HTTP Response Hijacking, SSH Brute force Attack, Web server Password Cracking, Web Application Attacks.

REFERENCES

  • Hacking: The Art of Exploitation is a book written by Jon Erickson.
  • The Basics of Hacking and Penetration Testing is written by Patrick Engebretson.
  • Penetration Testing, a security expert, researcher, and trainer is written by Georgia Weidman.
  • Hacking: Computer Hacking, Security Testing is a book written by Gary Hall.

Specialisations  – Cloud Computing

Cloud Computing is the on-demand course for the industry, the course teaches storing and retrieving data globally. Softlogic Systems provides the best practice on cloud computing usage to handle big data of an organization with the remote server access. We offer preeminent placement assistance and worthwhile certification after the successful course completion along with adequate hands-on experiences based on our industry-relevant cloud computing course syllabus to perform well in the companies from the beginning. 

Program Highlights

  • The course presents a top-down view of cloud computing, from applications and administration to programming and infrastructure.
  • Its main focus is on parallel programming techniques for cloud computing and large-scale distributed systems which form the cloud infrastructure.
  • Overview of cloud computing, cloud systems, Cloud Service Administration, Accessing the Cloud parallel processing in the cloud, distributed storage systems, virtualization, cloud standards, and Migrating to the Cloud.
  • Knowledge about the state-of-the-art solutions for cloud computing developed by Google, Amazon, Microsoft, Yahoo, VMWare, etc. Students will also apply what they learn in one programming assignment and one project executed over Amazon Web Services.

Learning Outcomes

  • To enable the student to analyse the trade-offs between deploying applications in the cloud and over the local infrastructure.
  • Compare the advantages and disadvantages of various cloud computing platforms.
  • Deploy applications over commercial cloud computing infrastructures such as Amazon Web Services, Windows Azure, and Google App Engine.
  • Program data intensive parallel applications in the cloud.

Cloud Computing Syllabus

Duration: 72 hrs theory + 30 hrs practical

UNIT I: INTRODUCTION

Introduction- Objectives, From collaborative to the Cloud – A short history Client – Server Computing, Peer-to-Peer Computing, Distributed Computing, Collaborative Computing, Cloud Computing, Functioning of Cloud Computing, Cloud Architecture, Cloud Storage, Cloud Services, Industrial Applications .Business Values, Introduction Objectives, Service Modelling, Infrastructure Services, Platform Services, Software Services – Software as service modes- Massively scaled software as a service- Scale of Economy, Management and Administration.

UNIT II: CLOUD SERVICE ADMINISTRATION

Cloud Service Administration- Service Level Agreements and Monitoring Support Services- Accounting Services, Resource Management- IT Security Performance Management- Provisioning- Service Management, Untangling

Software Dependencies. Cloud Computing Technology- Introduction-Objectives, Clients – Mobile – Thin – Thick, Security – Data Linkage – Offloading Work – Logging – Forensics – Development – Auditing, Network- Basic Public Internet the Accelerated Internet- Optimised Internet Overlay- Site-to-Site VPN- Cloud Providers- Cloud Consumers – Pipe Size- Redundancy, Services- Identity Integration- Mapping- Payments- Search.

UNIT III: ACCESSING THE CLOUD

Introduction-Objectives, Platforms- Web Application Framework- Web Hosting Services- Proprietary Methods, Web Applications- API’s in Cloud Computing, Browsers for Cloud Computing- Internet Explorer- Mozilla Firefox- Safari Chrome. Data Management- Introduction- Objectives, Data Security- Data Location- Data Control- Securing data for transport, Scalability and Cloud Services- Large Scale Data Processing- Databases and Data Stores- Data Archival.

UNIT IV: INFORMATION STORAGE IN CLOUD COMPUTING

Introduction- Objectives, Storage as a Service, Storage Providers- Amazon Simple Storage Service- Nirvana- Google Big table Data store- Mobile Me- Live Mesh, Storage Security, Merits and Demerits of Storage. Defining a private cloud Public, Private, and Hybrid Clouds – A Comparison, Examining the Economics of the private cloud

UNIT V: CLOUD COMPUTING STANDARDS

Introduction- Objectives, Best Practices and Standards, Practical Issues Interoperability- Portability- Integration- Security, Standards Organizations and Groups- Cloud Security Alliance- Distributed Management Task Force (DMTF)- National Institute of Standards and Technology (NIST)- Open Cloud Consortium (OCC)- Open Grid Forum (OGF)- Object Management Group (OMG)- Storage Networking Industry Association (SNIA)- Cloud Computing Interoperability Forum (CCIF)- Vertical Groups. Migrating to the Cloud- Introduction Objectives, Cloud Services for individuals- Available Services – Sky tap Solution, Cloud Services Aimed at the mid – market, Enterprise Class Cloud Offerings

Unit VI: CLOUD CRYPTOGRAPHY

Pre-encrypted data, End-to-end encryption, File encryption, Full disk encryption, data on the cloud be secured by Cryptography, Data Encryption Standard (DES), Triple Data Encryption Standard (3DES), Advanced Encryption Standard (AES).

REFERENCES

  • Cloud Computing: Concepts, Technology & Architecture by Thomas Earl.
  • Cloud computing from beginning to End by Ray J. Rafaels
  • Building the infrastructure for cloud security by RaghuRamYeluri
  • Architecting the Cloud: Design Decisions for cloud computing service models by Michael Jokai
  • The Great Cloud Migration by Michael C. Daconta.