0% found this document useful (0 votes)
460 views

VAPT Syllabus

This document outlines a course on Vulnerability Assessment and Penetration Testing. The course has 5 modules that cover topics like pentest planning, information gathering, vulnerability verification, maintaining access, and using penetration testing tools. The course objectives are for students to understand vulnerability assessment fundamentals and techniques. By the end of the course students will be able to analyze pentest plans, apply vulnerability checking methods, evaluate security techniques, and develop programming scripts for penetration testing.

Uploaded by

Fatema Taha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
460 views

VAPT Syllabus

This document outlines a course on Vulnerability Assessment and Penetration Testing. The course has 5 modules that cover topics like pentest planning, information gathering, vulnerability verification, maintaining access, and using penetration testing tools. The course objectives are for students to understand vulnerability assessment fundamentals and techniques. By the end of the course students will be able to analyze pentest plans, apply vulnerability checking methods, evaluate security techniques, and develop programming scripts for penetration testing.

Uploaded by

Fatema Taha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

VULNERABILITY ASSESSMENT AND

PENETRATION TESTING
Course Title: Vulnerability Assessment and Penetration Testing
Course Code: 22MCAISE4023
Credits Units: 04 Contact Hours: 60 L-T-P: 4-0-0
IA: UE Weightage – 50 : 50 Pass Marks (IA & UE) - 20&20 Aggregate Pass Marks: 50
UE Question Paper Marks: 50

Course Objectives:
COB1 Students will be able to understand the fundamentals on Vulnerability Assessment
COB2 Students will be able to use Assessment techniques to find Vulnerabilities

Course Outcomes:
At the end of the course, students will be able to

Course Bloom’s
Description
Outcome Taxonomy Level
Understand the parts of plan for conducting the Pen test by analyzing
CO 1 L2
suitable metrics.
Apply the kind of Vulnerability by verifying the information gathering
CO 2 L3
process
CO 3 Analyze the verification task to find the vulnerability L4
CO 4 Evaluate techniques to secure the files from vulnerabilities L5
CO 5 Develop programming scripts required in Pen Testing L6

CO-PO-PSO Mapping (3-strong, 2-medium, 1-weak)

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

CO1 3 2 2 2 3
CO2 2 1 1 1 2

CO3 2 1 2 2 1 1 2 1
CO4 2 1 2 1 2 1 1 2
CO5 2 1 1 2 1 2
SYLLABUS:

Tools/Soft
CO PO ware/Dat
Module Topic
Mapping Mapping abase
Used
Pentest Planning, Metrics and Management Scope
Pentest Overview, Planning and scoping, Penetration
Testing Methodology, Planning Penetrates of
PO-1
Engagement, Legal Concepts, Testing Strategies,
White Box Support Resources, Types of Assessments, PO-2
1
Threat Actors, Target Selection, Quantitative, CO1 PO-5
(12 Hrs)
Qualitative, and Mixed Methods; Quantitative PO-6
Analysis, Qualitative Analysis, Mixed Method
Analysis. Current Methodologies; Project
Management Institute, ISSAF, OSSTMM, Tool-
Generated Reports.
Vulnerability Identification and Information
Gathering
Introduction: Information Gathering, Passive
Information Gathering; Web Presence, Corporate Data,
WHOIS, DNS Enumeration, Additional Internet
Resources. Active Information Gathering; DNS
Interrogation, E-mail Accounts, Perimeter Network PO-3
2 Identification, Network Surveying. Project CO2 PO-4
(12 Hrs) Management; Executing Process Phase, Monitoring
and Control Process. Vulnerability Identification, Port PO-7
Scanning; Target Verification, UDP Scanning, TCP
Scanning, Perimeter Avoidance Scanning. System
Identification; Active OS Fingerprinting, Passive OS
Fingerprinting, Services Identification; Banner
Grabbing, Enumerating Unknown Services.
Vulnerability Identification.
Vulnerability Verification and Privilege Escalation
Introduction, Exploit Codes – Finding and Running;
Internet Sites, Automated Tools, Fuzzing, Code
Review, Application Reversing.Web Hacking; SQL
Injection, Cross-Site Scripting, Web Application PO-8
Vulnerabilities. Project Management; Executing PO-9
3 Process Phase, Monitoring and Control Process. CO3 PO-10
(12 Hrs) Compromising a System, System Enumeration;
Internal Vulnerabilities, Sensitive Data. Network PO-11
Packet Sniffing. Social Engineering; Baiting, Phishing,
Pretexting. Wireless Attacks; Wi-Fi Protected Access
Attack, WEP Attack, Privilege Escalation (Linux &
Windows, Lateral Movement, Persistence.
Marinating Access and Covering Tracks
Shells and Reverse Shells; Netcat Shell, Netcat
Reverse Shell. Encrypted Tunnels; Adding a Host
Firewall, Setting Up the SSH Reverse Shell. PO-9
4
Encryption and Tunnel Methods. Introduction to CO4 PO-10
(12 Hrs)
Covering Your Tracks, Manipulating Log Data, PO-12
Application Logs. Hiding Files; Hiding Files in Plain
Sight, Hiding Files Using the File System, Hiding
Files in Windows.
Penetration Tools and Reporting
Overview-Penetration Testing Tools ,Nmap Usage,
Use Cases for Tools, Scanners, Credential Testing
Tools, Password Cracking, Debuggers, Software
Assurance, OSINT, Wireless, Web Proxies, Social
Engineering Tools, Remote Access Tools, Networking
5 Tools, Mobile Tools Miscellaneous Tools, Intro to PO-9
Programming, Programming Concepts, BASH Script CO5 PO-10
(12 hrs)
Example, Python Script Example, PowerShell Script
PO-11
Example, Ruby Script Example. Reporting and
Communication; Overview- Reporting and PO-12
Communication, Pentest Communications, Report
Writing, Mitigation Strategies, Post-Report Activities,
Pentest Report Example.

Text Books

Professional Penetration Testing Creating and Operating -a Formal Hacking Lab, Syngress
1.
2015.

2. Ethical Hacking and Penetration Testing Guide-RafayBaloch, Taylor and Francis Group,
2015

References Books:
1. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing
Made Easy by Patrick Engebretson, Syngress; 2 editions (12 September 2013).

You might also like