0% found this document useful (0 votes)
146 views4 pages

Nptel Info

The document contains information about three online courses - Ethical Hacking, Cyber Security, and IoT. The Ethical Hacking course is a 12-week undergraduate elective course approved by AICTE that will run from July 29 to October 18, 2019. It covers topics like networking fundamentals, cryptography, vulnerability assessment, password cracking and web application hacking. The Cyber Security course is a 12-week undergraduate core course that provides an introduction to topics such as securing web browsers, email and social media, mobile security, cybersecurity initiatives in India and techniques. The IoT course is also a 12-week undergraduate elective course approved by AICTE running from July 29 to October 18,

Uploaded by

Amarjit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views4 pages

Nptel Info

The document contains information about three online courses - Ethical Hacking, Cyber Security, and IoT. The Ethical Hacking course is a 12-week undergraduate elective course approved by AICTE that will run from July 29 to October 18, 2019. It covers topics like networking fundamentals, cryptography, vulnerability assessment, password cracking and web application hacking. The Cyber Security course is a 12-week undergraduate core course that provides an introduction to topics such as securing web browsers, email and social media, mobile security, cybersecurity initiatives in India and techniques. The IoT course is also a 12-week undergraduate elective course approved by AICTE running from July 29 to October 18,

Uploaded by

Amarjit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

#ethical hacking:

**sites:
https://swayam.gov.in/nd1_noc19_cs68/preview

**info:
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 29 Jul 2019
End Date : 18 Oct 2019
Exam Date : 16 Nov 2019
Category : Computer Science and Engineering
Level : Undergraduate
This is an AICTE approved FDP course

**BOOKS AND REFERENCES


1.Data and Computer Communications -- W. Stallings.
2.Data Communication and Networking -- B. A. Forouzan
3.TCP/IP Protocol Suite -- B. A. Forouzan
4.UNIX Network Programming -- W. R. Stallings
5.Introduction to Computer Networks and Cybersecurity -- C-H. Wu and J. D. Irwin
6.Cryptography and Network Security: Principles and Practice -- W. Stallings
7.** Various web resources **

**COURSE LAYOUT:
Week 1: Introduction to ethical hacking. Fundamentals of computer networking.
TCP/IP protocol stack.
Week 2: IP addressing and routing. TCP and UDP. IP subnets.
Week 3: Routing protocols. IP version 6.
Week 4: Demonstration Session:: Vulnerability assessment: OpenVAS, Nessus, etc.
System hacking: password cracking, penetration testing, etc.
Week 5: Demonstration Session: Social engineering attacks.
Malware threats, penetration testing by creating backdoors.
Week 6: Introduction to cryptography, private-key encryption, public-key
encryption.
Week 7: Cryptographic hash functions, digital signature and certificate,
applications.
Week 8: Steganography, biometric authentication, network-based attacks, DNS and
Email security.
Week 9: Demonstration Session:: Sniffing: Wireshark, ARP poisoning, DNS
poisoning.
Hacking wireless networks, Denial of service attacks.
Week 10: Elements of hardware security: side-channel attacks, physical inclinable
functions, hardware trojans.
Week 11: Demonstration Session:: Hacking web applications: vulnerability
assessment, SQL injection, cross-site scripting.
Week 12: Case studies: various attacks scenarios and their remedies.

#cyber security:

**sites:
https://swayam.gov.in/nd2_nou19_cs08/preview

**info:
Course Status : Upcoming
Course Type : Core
Duration : 12 weeks
Start Date : 01 Jul 2019
End Date :
Exam Date :
Category :
Computer Science and Engineering
Level : Undergraduate

**BOOKS AND REFERENCES:


1 Introduction to Cyber Security available at http://uou.ac.in/foundation-
course
2. Fundamentals of Information Security http://uou.ac.in/progdetail?pid=CEGCS-
17
3. Cyber Security Techniques http://uou.ac.in/progdetail?pid=CEGCS-17
4. Cyber Attacks and Counter Measures: User Perspective
http://uou.ac.in/progdetail?pid=CEGCS-17
5. Information System http://uou.ac.in/progdetail?pid=CEGCS-17

**COURSE LAYOUT:
(Introduction to Cyber Security)
WEEK 1: INTRODUCTION TO CYBER SPACE
History of Internet [Dr. Jeetendra Pande, Uttarakhand Open University]
Cyber Crime [Dr. Jeetendra Pande, Uttarakhand Open University]
Information Security [Dr. Jeetendra Pande, Uttarakhand Open University]
Computer Ethics and Security Policies [Dr. Jeetendra Pande, Uttarakhand Open
University]
Quiz

WEEK 2: CHOOSING THE BEST BROWSER ACCORDING TO THE REQUIREMENT


Securing web browser-I [Mr. Arun Kumar- CISSP]
Securing web browsers-II [Mr. Arun Kumar- CISSP]
Guidelines to choose web browsers [Mr. Arun Kumar- CISSP]
Antivirus [Mr. Arun Kumar- CISSP]
Quiz

WEEK 3: GUIDELINES FOR SECURE PASSWORD AND EMAIL SECURITY


Setting up a password [Mr. Arun Kumar- CISSP]
Two-steps authentication [Mr. Arun Kumar- CISSP]
Using Password Manager [Mr. Arun Kumar- CISSP]
Email security [Dr. Ajay Prasad, UPES, Dehradun]
Quiz

WEEK 4: GUIDELINES FOR SOCIAL MEDIA AND BASIC WINDOWS SECURITY


Guidelines for social media security [Dr. V.V. Rao, Scientist- CERT-In]
Tips and best practices for safer Social Networking [Dr. V..V. Rao, Scientist-
CERT-In]
Basic Security for Windows [Dr. Jeetendra Pande, Uttarakhand Open University]
User Account Password [Dr. Jeetendra Pande, Uttarakhand Open University]
Quiz

WEEK 5: SMARTPHONE SECURITY GUIDELINES


Introduction to mobile phones [Dr. Jeetendra Pande, Uttarakhand Open University]
Smartphone Security [Dr. Jeetendra Pande, Uttarakhand Open University]
Android Security [Dr. Jeetendra Pande, Uttarakhand Open University]
IOS Security [Dr. Jeetendra Pande, Uttarakhand Open University]
Quiz

WEEK 6: CYBER SECURITY INITIATIVES IN INDIA


Counter Cyber Security Initiatives in India [Mr. Ashutosh Bahuguna- Scientist-
CERT-In]
Cyber Security Exercise [Mr. Ashutosh Bahuguna- Scientist- CERT-In]
Cyber Security Incident Handling [Mr. Ashutosh Bahuguna- Scientist- CERT-In]
Cyber Security Assurance [Mr. Ashutosh Bahuguna- Scientist- CERT-In]
Quiz

WEEK 7: ONLINE BANKING SECURITY


Online Banking Security [Dr. Jeetendra Pande, Uttarakhand Open University]
Online Banking Security [Dr. Jeetendra Pande, Uttarakhand Open University]
Mobile Banking Security [Dr. Jeetendra Pande, Uttarakhand Open University]
Security of Micro ATMs [Dr. Jeetendra Pande, Uttarakhand Open University]
Quiz

WEEK 8: CREDIT CARD, UPI AND E-WALLET SECURITY


Credit Card Security Guidelines [Dr. Jeetendra Pande, Uttarakhand Open
University]
UPI Security Guidelines [Dr. Jeetendra Pande, Uttarakhand Open University]
e-wallet Security Guidelines [Dr. Jeetendra Pande, Uttarakhand Open University]
Security Guidelines for Point of Sales(POS) [Dr. Jeetendra Pande, Uttarakhand
Open University]
Quiz

WEEK 9: CYBER SECURITY TECHNIQUES AND SOCIAL ENGINEERING


Cyber Security Techniques-I [Ms. Tripti Misra, Assistant Professor- UPES,
Dehradun]
Cyber Security Techniques-II [Ms. Shahina Anwaru, Assistant Professor- UPES,
Dehradun]
Social Engineering [Dr. Jeetendra Pande, Uttarakhand Open University]
Types of Social Engineering [Dr. Jeetendra Pande,Uttarakhand Open University]
Quiz
WEEK 10: MISC. TOPICS
IT Security Act 2000 [ Dr. Darpan Anand- Chandigarh University, ]
Firewall [Dr. Ajay Prasad, UPES, Dehradun]
How to prevent for being a victim of Cyber Crime [Er. Jayash Sharma, Anand
Engineering College]
Cyber Security- The changing threat landscape [Dr. A Murli Rao, Head- Computer
Division, IGNOU]
Quiz

WEEK 11: MISC. TOPICS


Emerging Threats and Security Technologies [Dr. A Murli Rao, Head- Computer
Division, IGNOU]
Hackers-Attacker-Countermeasures [Dr. A Murli Rao, Head- Computer Division,
IGNOU]
Web Application Security [Dr. A Murli Rao, Head- Computer Division, IGNOU]
Digital Infrastructure Security [Dr. A Murli Rao, Head- Computer Division,
IGNOU]
Quiz

WEEK 12: FINAL EXAM

#IOT:

**sites:
https://swayam.gov.in/nd1_noc19_cs65/preview

**Info:
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 29 Jul 2019
End Date : 18 Oct 2019
Exam Date : 17 Nov 2019
Category :
Computer Science and Engineering
Level : Undergraduate
This is an AICTE approved FDP course

**BOOKS AND REFERENCES:


1."The Internet of Things: Enabling Technologies, Platforms, and Use Cases", by
Pethuru Raj and Anupama C. Raman (CRC Press)
2."Internet of Things: A Hands-on Approach", by Arshdeep Bahga and Vijay Madisetti
(Universities Press)
3.Research papers

**COURSE LAYOUT:
Week 1: Introduction to IoT: Part I, Part II, Sensing, Actuation, Basics of
Networking: Part-I
Week 2: Basics of Networking: Part-II, Part III, Part IV, Communication Protocols:
Part I, Part II
Week 3: Communication Protocols: Part III, Part IV, Part V, Sensor Networks: Part
I, Part II
Week 4: Sensor Networks: Part III, Part IV, Part V, Part VI, Machine-to-Machine
Communications
Week 5: Interoperability in IoT, Introduction to Arduino Programming: Part I, Part
II, Integration of Sensors and Actuators with Arduino: Part I, Part II
Week 6: Introduction to Python programming, Introduction to Raspberry Pi,
Implementation of IoT with Raspberry Pi
Week 7: Implementation of IoT with Raspberry Pi (contd), Introduction to SDN, SDN
for IoT
Week 8: SDN for IoT (contd), Data Handling and Analytics, Cloud Computing
Week 9: Cloud Computing(contd), Sensor-Cloud
Week 10: Fog Computing, Smart Cities and Smart Homes
Week 11: Connected Vehicles, Smart Grid, Industrial IoT
Week 12: Industrial IoT (contd), Case Study: Agriculture, Healthcare, Activity
Monitoring

You might also like