Cyber Security Course Syllabus: Day Topic / Contents Remarks 1 FN

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3
At a glance
Powered by AI
The cyber security course syllabus outlines topics that will cover fundamentals of cyber security, computer networks, network security, operating system security, mobile device security, and hands-on labs and exercises.

The course will cover topics such as introduction to cyber security, CIA triad, risk management, computer network fundamentals, network addressing, network forensics, network defense, network security essentials, Windows security, Linux security, mobile device security, and red team vs. blue team exercises.

Some fundamental computer network concepts that will be discussed include network models, network types and standards, network devices, network protocols, network addressing, ports, OSI model, TCP/IP stack, and network tools like tcpdump and Wireshark.

Cyber Security Course Syllabus

Day Topic / Contents Remarks


1 Introduction to Cyber Security
FN  Fundamentals.
 Core security terms and principles.
 Principle of Least Privilege
 Indian Government Laws for Cyber Security
1  Confidentiality, Integrity, Availability (CIA)
AN  Fundamentals of risk management
 Security policy
 Authentication/authorization/accountability
2 Computer Network Fundamentals
FN  Working model of Computer Network.
 Network types and standards.
 Network Switches, Routers, Protocols and Encapsulation.
 Network Security Devices (Firewalls etc).
2  Network Addressing and Ports
AN  Open Systems Interconnection (OSI) protocol stack
 TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS.
3 Foundational Network Forensics Tools
FN  tcpdump introduction
o pcap file format
o Berkeley Packet Filter (BPF)
o Data reduction
o Useful command-line parameters
 Wireshark introduction
o User interface
o Display filters
o Useful features for network forensic analysis

3 Network Evidence Acquisition
AN  Full-packet capture, Logs, NetFlow
 Capture devices: switches, taps, Layer 7 sources, NetFlow
 Planning to capture: strategies; commercial and home-built
platforms

4 Network Security
FN  Defense-in-Depth
 Access Control & Password Management
 Security Policies
4  Critical Controls
AN  Malicious Code and Exploit Mitigations
 Malicious Software
 Advanced Persistent Threat (APT)
5 Network Security Essentials
FN  Defensible Network Architecture
 Virtualization and Cloud Security
 Network Device Security
5  Networking and Protocols
AN o Lab - tcpdump
 Securing Wireless Networks
o Lab - Aircrack-ng
 Securing Web Communications
o Lab -Wireshark
6 Windows Operating System Security
FN  Windows Security Infrastructure
 Service packs, hot fixes, and backups
 Windows access controls
 Microsoft Baseline Security Analyzer
 Enforcing security policy
 Securing Windows Network Services
 Automation, auditing, and forensics
 PowerShell Scripting
6 Linux Security
AN  Linux Security Structure, Permissions and Access
 Hardening and Securing Linux Services
 Monitoring and Attack Detection
 Security Utilities
7 Organisation wide Security Management
FN  Inventory of Authorized and Unauthorized Devices
 Inventory of Authorized and Unauthorized Software
 Secure Configurations for Hardware and Software on Laptops,
Workstations, and Servers
 Continuous Vulnerability Assessment and Remediation
7  Controlled Use of Administrative Privileges
AN  Maintenance, Monitoring, and Analysis of Audit Logs
 Email and Web Browser Protections
 Malware Defenses
 Limitation and Control of Network Ports, Protocols, and
Services

8 Mobile Device Security


FN  Mobile Device Platform Analysis
 Secure mobile phone deployments
 Weaknesses in mobile devices
 Exploiting weaknesses in mobile apps.
8  iOS and Android permission management models
AN
 Code signing weaknesses on Android
 Inter-app communication channels on iOS
 Android app execution: Android Runtime vs. Android Dalvik
virtual machine
 Android Nougat security benefits
9  Cyber Range : Read Team Vs Blue Team
FN
9  Cyber Range : Read Team Vs Blue Team
AN
10  Cyber Range : Read Team Vs Blue Team
FN
10  Cyber Range : Read Team Vs Blue Team
AN

You might also like