Topic: Ethical Hacking Subject: Corporate
Communication
Faculty: Dr.Nigam Dave
Nigam.Dave@spt.pdpu.ac.in
Key Learning (s): Unit Essential Question(s):
Concept: Concept: Concept: Concept:
Lesson Essential Points Lesson Essential Points Lesson Essential Points Lesson Essential Points
Concept: - Ethical hacking is a form of legal hacking
that is done with the permission of an organization to
help increase its security. We discuss ethical hacking
and debate its relevance today.
D
What is hacking? What is Ethical
Hacking? What do Ethical Hackers
do? What skills are required?
(1)Elaborately define ethical
hacking and debate how ethical
hackers can protect
communication.
Optional Instructional Tools
While writing your answers,
cite examples from real life.
First write down all points at
the start of your answer as
‘Key Concepts’
What is Hacking? What is
ethical hacking?
What do ethical hackers
do?
Skills required by an
ethical hacker
Modes of Ethical
Hacking
*Old school hackers of MIT
*Ethical hacking is to discover
vulnerabilities existing in
Information Systems.
* Companies realized that the best
way to understand the intruder
threat is to hire technical experts
who would be allowed to break
into the system and then find out
ways of improving and protecting
the system. Computer security is
equal to business profitability.
Evaluate:
*What an intruder can see on
target system.
* What can be done with such
information?
*Evaluate target system
security and report back to
owners.
*Informing clients about risk
factors.
Give advice on how to prevent
vulnerabilities.
*Knowledge of routers and
routing protocols.
*Skills in configuration.
*Linux Security Setting
*Firewalls
*Network Protocols
*HR with penetration testing
team.
Insider Attack
Outsider Attack
Stolen Equipment Attack
Physical Entry
Bypassed Authentication Attack
Social Engineering Attack
Vocabulary: Vocabulary: Vocabulary: Vocabulary:
Additional Information:
Script-Kiddies, Cyber Punks,
Crackers, Coders, Virus Writers.
Reconnaissance, Black Hats,
White Hats, Gray Hats.
Target System, Intruder, cyber
attack, cyber vulnerability.
Routing protocols, firewall,
network protocols, system
configuration, TCP/IP
Strategies – Whois, Samspade, Nslookup, Traceroute, Ping, nmap, nmapwin, superscan, IP Scanner, Hyena, Retina, telnet, snadboy, lophtcrack, keylogger, netbus, sub seven,
SpoofedMac, Ethereal, Iris, Snort, Cain and Abel, Legion, Brutus, Imagehide, Clearlogs, Google Cheat Sheet, SQL Injection.
Disclaimer – All the material should be used for academic purpose only. Hacking without permission is a legal offence.

Lesson plan ethical hacking

  • 1.
    Topic: Ethical HackingSubject: Corporate Communication Faculty: Dr.Nigam Dave Nigam.Dave@spt.pdpu.ac.in Key Learning (s): Unit Essential Question(s): Concept: Concept: Concept: Concept: Lesson Essential Points Lesson Essential Points Lesson Essential Points Lesson Essential Points Concept: - Ethical hacking is a form of legal hacking that is done with the permission of an organization to help increase its security. We discuss ethical hacking and debate its relevance today. D What is hacking? What is Ethical Hacking? What do Ethical Hackers do? What skills are required? (1)Elaborately define ethical hacking and debate how ethical hackers can protect communication. Optional Instructional Tools While writing your answers, cite examples from real life. First write down all points at the start of your answer as ‘Key Concepts’ What is Hacking? What is ethical hacking? What do ethical hackers do? Skills required by an ethical hacker Modes of Ethical Hacking *Old school hackers of MIT *Ethical hacking is to discover vulnerabilities existing in Information Systems. * Companies realized that the best way to understand the intruder threat is to hire technical experts who would be allowed to break into the system and then find out ways of improving and protecting the system. Computer security is equal to business profitability. Evaluate: *What an intruder can see on target system. * What can be done with such information? *Evaluate target system security and report back to owners. *Informing clients about risk factors. Give advice on how to prevent vulnerabilities. *Knowledge of routers and routing protocols. *Skills in configuration. *Linux Security Setting *Firewalls *Network Protocols *HR with penetration testing team. Insider Attack Outsider Attack Stolen Equipment Attack Physical Entry Bypassed Authentication Attack Social Engineering Attack
  • 2.
    Vocabulary: Vocabulary: Vocabulary:Vocabulary: Additional Information: Script-Kiddies, Cyber Punks, Crackers, Coders, Virus Writers. Reconnaissance, Black Hats, White Hats, Gray Hats. Target System, Intruder, cyber attack, cyber vulnerability. Routing protocols, firewall, network protocols, system configuration, TCP/IP Strategies – Whois, Samspade, Nslookup, Traceroute, Ping, nmap, nmapwin, superscan, IP Scanner, Hyena, Retina, telnet, snadboy, lophtcrack, keylogger, netbus, sub seven, SpoofedMac, Ethereal, Iris, Snort, Cain and Abel, Legion, Brutus, Imagehide, Clearlogs, Google Cheat Sheet, SQL Injection. Disclaimer – All the material should be used for academic purpose only. Hacking without permission is a legal offence.