Course Outcome:
After completing this course learners will be able to:
CO1: Understand the concepts of Ethical Hacking and compare between classes of Hackers. (Understand, Analyze)
CO2: Describe Scanning and System Hacking along with identifying and using tools to carry out the process. (Apply)
CO3: Demonstrate different tools for understanding the concept of Sniffers, DoS attack, SQL Injection. (Apply)
CO4: Understand and provide justification with examples on malware use and how each works in their way to compromise a system. (Understand, Evaluate)
CO5: Comprehend the dangers associated with penetration testing. (Understand)
After completing this course learners will be able to:
CO1: Understand the concepts of Ethical Hacking and compare between classes of Hackers. (Understand, Analyze)
CO2: Describe Scanning and System Hacking along with identifying and using tools to carry out the process. (Apply)
CO3: Demonstrate different tools for understanding the concept of Sniffers, DoS attack, SQL Injection. (Apply)
CO4: Understand and provide justification with examples on malware use and how each works in their way to compromise a system. (Understand, Evaluate)
CO5: Comprehend the dangers associated with penetration testing. (Understand)

- Teacher: Sweety Garg