0% found this document useful (0 votes)
258 views3 pages

Cyber Security Course Syllabus: Day Topic / Contents Remarks 1 FN

The document outlines a 10-day syllabus for a cyber security course. It covers fundamental topics on the first day such as security principles, laws, and risk management. Networking concepts such as architectures, protocols, and security devices are addressed on day 2. Days 3-5 focus on network security essentials including forensics tools, evidence acquisition, defense strategies, and securing specific protocols and devices. Operating system security on Windows and Linux is covered on days 6-7. Mobile device security is the topic on day 8. Days 9-10 involve a cyber range exercise pitting red and blue teams against each other.

Uploaded by

sendhil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
258 views3 pages

Cyber Security Course Syllabus: Day Topic / Contents Remarks 1 FN

The document outlines a 10-day syllabus for a cyber security course. It covers fundamental topics on the first day such as security principles, laws, and risk management. Networking concepts such as architectures, protocols, and security devices are addressed on day 2. Days 3-5 focus on network security essentials including forensics tools, evidence acquisition, defense strategies, and securing specific protocols and devices. Operating system security on Windows and Linux is covered on days 6-7. Mobile device security is the topic on day 8. Days 9-10 involve a cyber range exercise pitting red and blue teams against each other.

Uploaded by

sendhil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Security Course Syllabus

Day Topic / Contents Remarks


1 Introduction to Cyber Security
FN  Fundamentals.
 Core security terms and principles.
 Principle of Least Privilege
 Indian Government Laws for Cyber Security
1  Confidentiality, Integrity, Availability (CIA)
AN  Fundamentals of risk management
 Security policy
 Authentication/authorization/accountability
2 Computer Network Fundamentals
FN  Working model of Computer Network.
 Network types and standards.
 Network Switches, Routers, Protocols and Encapsulation.
 Network Security Devices (Firewalls etc).
2  Network Addressing and Ports
AN  Open Systems Interconnection (OSI) protocol stack
 TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS.
3 Foundational Network Forensics Tools
FN  tcpdump introduction
o pcap file format
o Berkeley Packet Filter (BPF)
o Data reduction
o Useful command-line parameters
 Wireshark introduction
o User interface
o Display filters
o Useful features for network forensic analysis

3 Network Evidence Acquisition
AN  Full-packet capture, Logs, NetFlow
 Capture devices: switches, taps, Layer 7 sources, NetFlow
 Planning to capture: strategies; commercial and home-built
platforms

4 Network Security
FN  Defense-in-Depth
 Access Control & Password Management
 Security Policies
4  Critical Controls
AN  Malicious Code and Exploit Mitigations
 Malicious Software
 Advanced Persistent Threat (APT)
5 Network Security Essentials
FN  Defensible Network Architecture
 Virtualization and Cloud Security
 Network Device Security
5  Networking and Protocols
AN o Lab - tcpdump
 Securing Wireless Networks
o Lab - Aircrack-ng
 Securing Web Communications
o Lab -Wireshark
6 Windows Operating System Security
FN  Windows Security Infrastructure
 Service packs, hot fixes, and backups
 Windows access controls
 Microsoft Baseline Security Analyzer
 Enforcing security policy
 Securing Windows Network Services
 Automation, auditing, and forensics
 PowerShell Scripting
6 Linux Security
AN  Linux Security Structure, Permissions and Access
 Hardening and Securing Linux Services
 Monitoring and Attack Detection
 Security Utilities
7 Organisation wide Security Management
FN  Inventory of Authorized and Unauthorized Devices
 Inventory of Authorized and Unauthorized Software
 Secure Configurations for Hardware and Software on Laptops,
Workstations, and Servers
 Continuous Vulnerability Assessment and Remediation
7  Controlled Use of Administrative Privileges
AN  Maintenance, Monitoring, and Analysis of Audit Logs
 Email and Web Browser Protections
 Malware Defenses
 Limitation and Control of Network Ports, Protocols, and
Services

8 Mobile Device Security


FN  Mobile Device Platform Analysis
 Secure mobile phone deployments
 Weaknesses in mobile devices
 Exploiting weaknesses in mobile apps.
8  iOS and Android permission management models
AN
 Code signing weaknesses on Android
 Inter-app communication channels on iOS
 Android app execution: Android Runtime vs. Android Dalvik
virtual machine
 Android Nougat security benefits
9  Cyber Range : Read Team Vs Blue Team
FN
9  Cyber Range : Read Team Vs Blue Team
AN
10  Cyber Range : Read Team Vs Blue Team
FN
10  Cyber Range : Read Team Vs Blue Team
AN

You might also like