Ethical Hacking

By Prof. Indranil Sen Gupta   |   IIT Kharagpur
Learners enrolled: 45934
Ethical hacking is a subject that has become very important in present-day context, and can help individuals and organizations to adopt safe practices and usage of their IT infrastructure. Starting from the basic topics like networking, network security and cryptography, the course will cover various attacks and vulnerabilities and ways to secure them. There will be hands-on demonstrations that will be helpful to the participants. The participants are encouraged to try and replicate the demonstration experiments that will be discussed as part of the course.

INTENDED AUDIENCE: Computer Science and Engineering / Information Technology / Electronics and Communication / Electrical Engineering
PRE-REQUISITES:         Basic concepts in programming and networking
INDUSTRY SUPPORT:   TCS, Wipro, CTS, Google, Microsoft, Qualcomm
Course Status : Ongoing
Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 07 Feb 2022
Category :
  • Computer Science and Engineering
Credit Points : 3
Level : Undergraduate/Postgraduate

Page Visits

Course layout

Week 1:   Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol stack.
Week 2:   IP addressing and routing. TCP and UDP. IP subnets.
Week 3:   Routing protocols. IP version 6.
Week-4:   Installation of attacker and victim system. Information gathering using advanced google search,
 archive.org, netcraft, whois, host, dig, dnsenum and NMAP tool.
Week-5: Vulnerability scanning using NMAP and Nessus. Creating a secure hacking environment.
System Hacking: password cracking, privilege escalation, application execution. Malware and
Virus. ARP spoofing and MAC attack.
Week 6:   Introduction to cryptography, private-key encryption, public-key encryption.
Week 7:   Cryptographic hash functions, digital signature and certificate, applications.
Week 8:   Steganography, biometric authentication, network-based attacks, DNS and Email security.
Week-9:   Packet sniffing using wireshark and burpsuite, password attack using burp suite.
 Social engineering attacks and Denial of service attacks.
Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions, hardware
Week-11: Different types of attacks using Metasploit framework: password cracking, privilege escalation,
 remote code execution, etc.Attack on web servers: password attack, SQL injection, cross site
Week 12: Case studies: various attacks scenarios and their remedies.

Books and references

  1. Data and Computer Communications -- W. Stallings.
  2. Data Communication and Networking -- B. A. Forouzan
  3. TCP/IP Protocol Suite -- B. A. Forouzan
  4. UNIX Network Programming -- W. R. Stallings
  5. Introduction to Computer Networks and Cybersecurity -- C-H. Wu and J. D. Irwin
  6. Cryptography and Network Security: Principles and Practice -- W. Stallings
  7. ** Various web resources **

Instructor bio

Prof. Indranil Sengupta has obtained his B.Tech., M.Tech. and Ph.D.
degrees in Computer Science from the University of Calcutta. He joined the Indian Institute of Technology, Kharagpur, as a faculty member in 1988, in the Department of CSE, where he is presently a full Professor. He had been the former Heads of the Department of Computer Science and Engineering and also the School of Information Technology of the Institute. He was also the Managing Director of Science and Technology Entrepreneurship Park (STEP), and the Professor-in-Charge of a Centre of Excellence in Information Assurance funded by the Ministry of Defense. He has over 30 years of teaching and research experience. He has guided 22 PhD students, and has more than 200 publications to his credit in international journals and conferences. His research interests include reversible and quantum computing, VLSI design and testing, and information security. He is a Senior Member of IEEE.

He had been the General Chairs of Asian Test Symposium (ATS-2005), International Conference on Cryptology in India (INDOCRYPT-2008), International Symposium on VLSI Design and Test (VDAT-2012), International Symposium on Electronic System Design (ISED-2012), and the International Conference on Reversible Computation (RC-2017).

Course certificate

The course is free to enroll and learn from. But if you want a certificate, you have to register and write the proctored exam conducted by us in person at any of the designated exam centres.
The exam is optional for a fee of Rs 1000/- (Rupees one thousand only).
Date and Time of Exams: 23 April 2022 Morning session 9am to 12 noon; Afternoon Session 2pm to 5pm.
Registration url: Announcements will be made when the registration form is open for registrations.
The online registration form has to be filled and the certification exam fee needs to be paid. More details will be made available when the exam registration form is published. If there are any changes, it will be mentioned then.
Please check the form for more details on the cities where the exams will be held, the conditions you agree to when you fill the form etc.


Average assignment score = 25% of average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Certificate will have your name, photograph and the score in the final exam with the breakup.It will have the logos of NPTEL and IIT Kharagpur .It will be e-verifiable at nptel.ac.in/noc.

Only the e-certificate will be made available. Hard copies will not be dispatched.

Once again, thanks for your interest in our online courses and certification. Happy learning.

- NPTEL team

MHRD logo Swayam logo


Goto google play store