Loading [a11y]/accessibility-menu.js
EHLS: Beginner to Advanced Ethical Hacking Learning Platform | IEEE Conference Publication | IEEE Xplore

EHLS: Beginner to Advanced Ethical Hacking Learning Platform


Abstract:

The Ethical Hacking Learning System (EHLS) is a comprehensive learning platform that includes all necessary resources in both theoretical and practical aspects. It will e...Show More

Abstract:

The Ethical Hacking Learning System (EHLS) is a comprehensive learning platform that includes all necessary resources in both theoretical and practical aspects. It will enable students to learn and practice ethical hacking in a secure and legal setting. It will be user-friendly to attract users and present them with a unique and engaging learning approach in ethical hacking programmers. EHLS also assists students and lecturers in managing and monitoring their learning processes, such as quizzes and performance tasks.
Date of Conference: 02-03 December 2022
Date Added to IEEE Xplore: 07 February 2023
ISBN Information:
Conference Location: Tumkur, Karnataka, India
References is not available for this document.

I. Introduction

When studying or teaching a subject that requires practical applications, it is critical to use the correct approach [1]. A lot of attention is paid to delicate topics like ethical hacking and penetration testing, which necessitate a mix of practical and theoretical information without ignoring one of them [2]. Neglecting any of these factors can result in an imbalance, which can lead to failure to meet the students’ objectives [3].

Select All
1.
R. Anderson, "Introduction to Identity on ASP.NET Core", 07 2020, [online] Available: https://docs.microsoft.com/enus/aspnet/core/security/authentication/identity?view=aspnetcore-3.1&tabs=visual-studio.
2.
"About Cybrary", 01 2020, [online] Available: https://www.cybrary.it/about/.
3.
"DVWA", 01 2020, [online] Available: http://www.dvwa.co.uk/.
4.
"Certified Ethical Hacker Certification", 01 2020, [online] Available: https://www.eccouncil.org/programs/certified-ethicalhacker-ceh/.
5.
G. Shabiralyani, K. S. Hasan, N. Hamad and N. Iqbal, "Impact of Visual Aids in Enhancing the Learning Process Case", Journal of Education and Practice, vol. 9, pp. 226-233, 2015.
6.
Tayag and Emmalyn, "COMPROMISING SYSTEMS: IMPLEMENTING", International Journal of Computer Science & Information Technology (IJCSIT), vol. 11, no. 2, 2019.
7.
A. Ushmani, "Ethical Hacking", International Journal of Information Technology (IJIT), vol. 4, no. 6, 2018.
8.
S. Wilson, "ASP.NET Core Identity (v3) uses PBKDF2 algorithm with HMAC-SHA256 128-bit salt 256-bit subkey and 10000 iterations", What does Caché use, 07 2019, [online] Available: https://community.intersystems.com/post/asp-net-core-identity-v3-uses-pbkdf2-algorithm-hmac-sha256-128-bit-salt-256-bit-subkey-and.
9.
M.A. Khan, A. Merabet, S. Alkaabi and H.E. Sayed, "Game-based learning platform to enhance cybersecurity education", Education and Information Technologies, pp. 1-25, 2022.
10.
S. Yang, S.D. Paul and S. Bhunia, "Hands-On Learning of Hardware and Systems Security", Advances in Engineering Education, vol. 9, no. 2, pp. n2, 2021.
11.
S. Yang, S.D. Paul and S. Bhunia, "Hands-On Learning of Hardware and Systems Security", Advances in Engineering Education, vol. 9, no. 2, pp. n2, 2021.
12.
R. Arnone, "Hackers Cybercrime-Computer Security: Ethical Hacking: Learn the attack for better defence", ARIS2-Advanced Research on Information Systems Security, vol. 1, no. 1, pp. 50-61, 2021.
13.
S. Perumal, M. Tabassum, G. Narayana Samy, S. Ponnan, A.K. Ramamoorthy and K.J. Sasikala, "Cybercrime Issues in Smart Cities Networks and Prevention Using Ethical Hacking", Data-Driven Mining Learning and Analytics for Secured Smart Cities, pp. 333-358, 2021.
14.
M. Tigner and H. Wimmer, "Disruption and protection of online synchronous learning environments via 802.11 manipulation", 2021 IEEE International IOT Electronics and Mechatronics Conference (IEMTRONICS), pp. 1-6, 2021, April.
15.
C.V. Anchugam, "Essential Security Elements and Phases of Hacking Attacks", Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention, pp. 114-143, 2021.
Contact IEEE to Subscribe

References

References is not available for this document.