0% found this document useful (0 votes)
188 views2 pages

EC466 Cyber Security

This document outlines a cyber security course covering topics like vulnerability scanning, network defense tools, web application vulnerabilities, cyber crimes and law, and cyber crime investigation. The 3 credit, 3 year course introduces students to various cyber attacks and teaches defensive techniques. Over 6 modules, students learn skills like port scanning, firewall configuration, password cracking, and digital forensics to understand and protect against cyber threats. Upon completing the course, students will be able to identify cyber attacks, understand applicable cyber laws, and safeguard individuals and networks from security risks.

Uploaded by

akhilaraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
188 views2 pages

EC466 Cyber Security

This document outlines a cyber security course covering topics like vulnerability scanning, network defense tools, web application vulnerabilities, cyber crimes and law, and cyber crime investigation. The 3 credit, 3 year course introduces students to various cyber attacks and teaches defensive techniques. Over 6 modules, students learn skills like port scanning, firewall configuration, password cracking, and digital forensics to understand and protect against cyber threats. Upon completing the course, students will be able to identify cyber attacks, understand applicable cyber laws, and safeguard individuals and networks from security risks.

Uploaded by

akhilaraj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

COURSE YEAR OF

CODE COURSE NAME L-T-P-C INTRODUCTION


EC466 CYBER SECURITY 3-0-0 -3 2016
Prerequisite: EC407 Computer Communication
Course objectives:
 To familiarize various types of cyber-attacks and cyber-crimes.
 To give an overview of the cyber laws
 To study the defensive techniques against these attacks
Syllabus:
Vulnerability scanning, tools for scanning, Network defense tools, Firewalls and Intrusion Detection
Systems, Virtual Private Networks, Scanning for web vulnerabilities tools, Cyber crimes and law,
cyber crime investigation
Expected outcome:
The students will be able to understand cyber-attacks, types of cybercrimes, cyber laws and also
how to protect them self and ultimately the entire Internet community from such attacks
Text Books:
1. Mike Shema , Anti-Hacker Tool Kit, Mc Graw Hill
2. Nina Godbole and Sunit Belpure, Cyber Security Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiley
References:
1. Achyut S.Godbole Data Communication and Networking,2e, McGraw –Hill Education New
Delhi,2011
2. Forouzan, Data Communication and Networking (Global Edition) 5/e, McGraw Hill
Education India, 2013.
3. Forouzan,TCP/IP Protocol Suite 4e, McGraw Hill Education India, 2010
Course Plan

Module Course contents End Sem.


Hours Exam
Marks
I Introduction to Vulnerability Scanning
Overview of vulnerability scanning, Open Port / Service
7 15%
Identification, Banner / Version Check, Traffic Probe, Vulnerability
Probe, Vulnerability Examples, OpenVAS, Metasploit.
II Network Vulnerability Scanning
Networks Vulnerability Scanning - Netcat, Socat, understanding Port
and Services tools - Datapipe, Fpipe, WinRelay, Network
7 15%
Reconnaissance – Nmap, THC-Amap and System tools, Network
Sniffers and Injection tools – Tcpdump and Windump, Wireshark,
Ettercap, Hping, Kismet
FIRST INTERNAL EXAM
Network Defense tools
Firewalls and Packet Filters: Firewall Basics, Packet Filter Vs
Firewall, How a Firewall Protects a Network, Packet Characteristic to 8
III 15%
Filter, Stateless Vs Stateful Firewalls, Network Address Translation
(NAT) and Port Forwarding, the basic of Virtual Private Networks,
Linux Firewall, Windows Firewall, Snort: Introduction Detection
System
Web Application Tools
Scanning for web vulnerabilities tools: Nikto, W3af, HTTP utilities -
Curl, OpenSSL and Stunnel, Application Inspection tools – Zed 6
IV 15%
Attack Proxy, Sqlmap. DVWA, Webgoat, Password Cracking and
Brute-Force Tools – John the Ripper, L0htcrack, Pwdump, HTC-
Hydra
SECOND INTERNAL EXAM
Introduction to Cyber Crime and law
Cyber Crimes, Types of Cybercrime, Hacking, Attack vectors,
Cyberspace and Criminal Behavior, Clarification of Terms,
Traditional Problems Associated with Computer Crime,
Introduction to Incident Response, Digital Forensics, Computer 8
V 20%
Language, Network Language, Realms of the Cyber world, A
Brief History of the Internet, Recognizing and Defining
Computer Crime, Contemporary Crimes, Computers as Targets,
Contaminants and Destruction of Data, Indian IT ACT 2000.

Introduction to Cyber Crime Investigation


Firewalls and Packet Filters, password Cracking, Keyloggers and 6
VI Spyware, Virus and Warms, Trojan and backdoors, Steganography, 20%
DOS and DDOS attack, SQL injection, Buffer Overflow, Attack on
wireless Networks
END SEMESTER EXAM

Question Paper Pattern

The question paper shall consist of three parts. Part A covers modules I and II, Part B covers
modules III and IV, and Part C covers modules V and VI. Each part has three questions
uniformly covering the two modules and each question can have maximum four subdivisions.
In each part, any two questions are to be answered. Mark patterns are as per the syllabus with
100% for theory.

You might also like