M.E. Electronics(Instrumentation Control):Network Security

Master

In Patiala

Price on request

Description

  • Type

    Master

  • Location

    Patiala

Facilities

Location

Start date

Patiala (Punjab)
See map
Thapar University P.O Box 32, 147004

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

First Semester

Measurement Science
Process Modeling and Control
Industrial Instrumentation and Control
Research Methodology
Artificial Intelligence Control Techniques


Second Semester

PC/Micro-controller based instrumentation
Virtual Instrumentation and its engineering applications
Trends in Bio-Medical Instrumentation


Third Semester

Seminar
Thesis ( starts )


Fourth Semester

Thesis


Network Security

Introduction: The Security, functionality and ease of use Triangle , Essential Terminology, Elements of Security, Difference between Penetration Testing and Ethical Hacking, Deliverables ethics and legality, Computer Crimes and Implications.

Reconnaissance: Information Gathering Methodology, Locate the Network Range, Active and Passive reconnaissance.

Scanning: Scanning, Elaboration phase, active scanning, scanning tools nmap, hping2. Enumeration, DNS Zone transfer

Trojans and Backdoors: Effect on Business, Trojan?, Overt and Covert Channels, Working of Trojans, Different Types of Trojans, Different ways a Trojan can get into a system, Indications of a Trojan Attack, Some famous Trojans and ports used by them.

Sniffers: Definition of sniffing, How a Sniffer works?, Passive Sniffing, Active Sniffing, Ethreal tool, Man-in-the-Midle Attacks, Spoofing and Sniffing Attacks, ARP Poisoning and countermeasures

Denial of Service: What is Denial of Service? , Goal of DoS(Denial of Service), Impact and Modes of Attack

Social Engineering: Social Engineering, Art of Manipulation, Human Weakness, Common Types of Social Engineering, Human Based Impersonation, Example of social engineering, Computer Based Social Engineering, Reverse Social Engineering, Policies and procedures, Security Policies-checklist.

Session Hijacking: Understanding Session Hijacking, Spoofing vs Hijacking, Steps in Session Hijacking, Types of Session Hijacking, TCP Concepts 3 Way Handshake, Sequence numbers

M.E. Electronics(Instrumentation Control):Network Security

Price on request