0% found this document useful (0 votes)
86 views21 pages

M.Sc. in Cyber Security (MSCS)

The document outlines the curriculum for a 2-year M.Sc. in Cyber Security program totaling 72 credits. It is divided into 4 semesters, with each semester consisting of both theory and practical courses. The 1st semester focuses on operating system basics, data communication and networking, and information security. Courses cover topics such as Windows and Linux operating systems, network models, encryption techniques, and security threats. Practical labs complement the theory courses to provide hands-on learning experiences.

Uploaded by

abcd World
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views21 pages

M.Sc. in Cyber Security (MSCS)

The document outlines the curriculum for a 2-year M.Sc. in Cyber Security program totaling 72 credits. It is divided into 4 semesters, with each semester consisting of both theory and practical courses. The 1st semester focuses on operating system basics, data communication and networking, and information security. Courses cover topics such as Windows and Linux operating systems, network models, encryption techniques, and security threats. Practical labs complement the theory courses to provide hands-on learning experiences.

Uploaded by

abcd World
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

M.Sc.

in Cyber Security (MSCS)


Duration: 02 Years Total credit: 72

1st Semester (MSCS)


Theory
Course
Course Title (T-L-P) Credit
Code
CSP-10 Operating System Basics T 02
CSP-11 Data Communication & Networking T 04
CSP-12 Information Security T 04
Total Theory Credits 10
Project / Laboratory
CSPL-10 Operating System Basics Lab L 02
CSPL-11 Data Communication & Networking Lab L 02
CSPL-12 Information Security Lab L 02
Total Project / Laboratory Credits 06
TOTAL SEMESTER CREDITS 16

2nd Semester (MSCS)


Theory
Course
Course Title (T-L-P) Credit
Code
CSP-13 Application Cyber Security T 04
CSP-14 Network Cyber Security T 04
CSP-15 Web Technology T 02
Total Theory Credits 10
Project / Laboratory
CSPL-13 Application Cyber Security Lab L 02
CSPL-14 Network Cyber Security Lab L 02
CSPL-15 Web Technology Lab L 02
Total Project / Laboratory Credits 06
TOTAL SEMESTER CREDITS 16
TOTAL CUMULATIVE CREDITS 32
3rd Semester (MSCS)
Theory
Course
Course Title (T-L-P) Credit
Code
CSP-16 White Hat Hacking T 04
CSP-17 Security Analysis and Reporting T 04
CSPE-01 Application development using PHP T 02
Total Theory Credits 10
Project / Laboratory
CSPL-16 White Hat Hacking Lab L 02
CSPL-17 Security Analysis and Reporting Lab L 02
CSPEL-01 Application development using PHP Lab L 02
CSPP-04 Project Work P 04
Total Project / Laboratory Credits 10
TOTAL SEMESTER CREDITS 20
TOTAL CUMULATIVE CREDITS 52

4th Semester (MSCS)


Theory
Course
Course Title (T-L-P) Credit
Code
CSP-18 Computer Forensics T 04
CSP-19 Cyber law and Regulation of Cyberspace T 04
CSPE-02 Programming in Java T 04
CSPE-03 Programming in Python T 02
Total Theory Credits 14
Project / Laboratory
CSPL-18 Computer Forensics Lab L 02
CSPEL-02 Programming in Java Lab L 02
CSPEL-03 Programming in Python Lab L 02
Total Project / Laboratory Credits 06
TOTAL SEMESTER CREDITS 20
TOTAL PROGRAMME CREDITS 72
1st Semester
Theory Syllabus
CSP-10: OPERATING SYSTEM BASICS (2 Credit)
Block-1 Windows Operating System
Introduction, Operating System Concept and its Types, Function of OS, Evolution of
Operating Systems, Introduction to Windows, Version of Windows, Operating System
Administrator, My Computer, Recycle Bin, Desktop, Drives, create a directory/folder,
Unit-1 rename/change to a directory/folder, creating a file in a directory/folder, Make the file
read only, Make the file/directory hidden, editing a file in a directory/folder, Delete a
file in a directory/folder.

Listing the files in the directory, create a file, copy a file from one directory to the
other, deleting all files from a directory/folder, Deleting a director/folder, Formatting a
Unit-2
hard disk and loading operating system, Domain, workgroup, Active Directory, User
Management, Network Setting, Services, IIS Configuration
Block -2 Linux Operating System
Introduction, History of Linux, Distributions of Linux, Devices and drivers, File system
Hierarchy, The components: Kernel, Distribution, XFree86, Sawfish, Gnome, The
Unit -1
command line commands, File, management commands, Working with nano, Working
with help (man).
SSH and X-forwarding, managing compressed archives with zip and tar, Working with
GNU screen, how to add users and groups, working with su, working with sudo,
Unit -2
changing user password, Printing, installing software with Yum, Yast, Rpm, Installing
webmin.

CSP-11 : DATA COMMUNICATION & NETWORKING (4 Credit)


Block-1 Introduction to Data communication and Networking
Unit-1 Fundamentals of data communication and networking
Unit-2 Network Reference Models: OSI and TCP/IP Models
Unit-3 Transmission media and network devices
Block -2 Physical and data link layer functionalities
Unit -1 Analog and Digital Signals
Unit -2 Encoding
Unit -3 Multiplexing and Switching: FDM,TDM,WDM,SDM, Message Switching and Circuit
Switching and Packet Switching
Unit -4 Data Link Control Protocols: Token Passing, CSMA/CD, CSMA, CSMA/CA
Block -3 Internet Protocols and Services
Unit-1 Network Layer: Internetworking, and IP addressing, ARP, RARP, ICMP,IGMP
Unit-2 Transport Layer protocols: TCP& UDP
Unit-3 Application Layer protocols: HTTP, HTTPs, SMTP, POP, DNS, TELNET, FTP
Unit-4 Internet and its Services: Intranet, Extranet, www, Email
CSP-12: INFORMATION SECURITY (4 Credit)
Block-1 Information Security Concepts and Cryptography
Unit-1 Information Security Concepts: Information security issues, goals, architecture,
Attacks, Security Services and Mechanisms.
Unit-2 Introduction to Cryptography: Network security model, Cryptographic systems,
Cryptanalysis, Steganography. Types of Cryptography: Symmetric key and
Asymmetric Key Cryptography, Encryption and Decryption Techniques.
Unit-3 Cryptographic Algorithms: Cryptographic hash, Message Digest, Data Encryption
Standard, Advanced Encryption Standard, RSA (Introductory concepts only)
Block-2 Security Threats and Vulnerabilities
Unit-1 Overview of Security threats and Vulnerability: Types of attacks on Confidentiality,
Integrity and Availability. Vulnerability and Threats.

Unit-2 Malware: Viruses, Worms, Trojan horses


Unit-3 Security Counter Measures; Intrusion Detection, Antivirus Software
Block-3 Ethical Issues in Information Security & Privacy
Unit-1 Information Security, Privacy and Ethics
Unit-2 Cyber Crime and Cyber Terrorism
Unit-3 Hacking: Ethical issues, Ethical Hacking
1st Semester
Practical Syllabus (MSCS)
CSPL-10: OPERATING SYSTEM BASICS LAB (2 Credit)
Windows OS Linux OS
1 Windows 7 installation 16 Red Hat Linux Installation

2 File and folder management in Windows 17 Linux Installation using Ubuntu

3 Create a file in windows 18 Linux Installation using Open Suse

4 Create a folder in Windows 19 Working with Linux Graphical User Interface

5 Copy a file to a folder 20 Working with terminal mode

6 Move a file to a folder 21 Basic Linux commands used in terminal Mode

7 Rename a file/ folder 22 Creating a file using Nano

8 Delete a file / folder 23 Working with the su command

9 Make a file read only 24 Working with sudo

10 Hide the file and unhide the file in Win 7 25 User and group management

11 Working with the command prompt 26 Working with Permissions

Steps to create user accounts Installing Software with Rpm


12 27
Changing Your Password Working with Yum
13 28
Changing Your Picture Yast
14 29
Creating a Password-Reset Disk Webmin
15 30
31 Data compression in Linux

CSPL-11 : DATA COMMUNICATION & NETWORKING LAB (2 Credit)


Expt-1 To study about different physical equipment’s used for networking

Expt-2 To study different internetworking devices in a computer network

Expt-3 To study the working of Basic Networking Commands

Expt-4 To assign IP address to the PC connected to the internet

Expt-5 To connect the computers in Local Area Network

Expt-6 Creating a Network topology using CISCO packet tracer software

CSPL-12 : INFORMATION SECURITY LAB (2 Credit)


Expt-1 To study the Private Key and Public Key cryptographic systems.

Expt-2 To study the classical encryption techniques: substitution and transposition

Expt-3 To analyze the encryption and decryption of RSA – Public Key Cryptography Algorithm

Expt-4 To study working of Intrusion detection System (IDS) tool

Expt-5 To study the prevention mechanisms to avoid Virus and other Malware in one’s PC

Expt-6 To study the prevention mechanisms to protect one’s PC from Hackers


2nd Semester
Theory Syllabus
CSP-13 : APPLICATION CYBER SECURITY (4 Credit)
Block-1 System Security
Unit-1 Desktop Security
Unit-2 Programming Bugs and Malicious code
Unit-3 Database Security
Unit-4 Operating System Security: Designing Secure Operating Systems, OS Security
Vulnerabilities.
Block -2 Security Management
Unit -1 Disaster recovery
Unit -2 Digital Signature
Unit - 3 Ethical Hacking, Penetration Testing
Unit -4 Computer Forensics
Block -3 Cyber Laws and Standards
Unit-1 ISO 27001, Cyber Law (Information Technology Act, 2000)
Unit-2 International Standards maintained for Cyber Security
Unit-3 Security Audit ,Investigation by Investing Agency
Unit-4 Cyber Security Solutions

CSP-14 : NETWORK CYBER SECURITY (4 Credit)


Block-1 Network Security
Unit-1 Network Security Model, Network Security Threats
Unit-2 Firewalls: Overview, Types, Features, User Management
Unit-3 Intrusion Detection System, Intrusion Prevention System
Unit-4 Public Key Infrastructure, Digital Signature Schemes
Block-2 Internet and Web Application Security
Unit-1 Email security: PGP and SMIME
Unit-2 Web Security: Web authentication, Injection Flaws, SQL Injection
Unit-3 Web Browser Security
Unit-4 E-Commerce Security
Block-3 Wireless Network Security
Unit-1 Wireless Network Components
Unit-2 Security issues in wireless Networks
Unit-3 Securing a wireless network
Unit-4 Mobile security
CSP-15: WEB TECHNOLOGY (2 Cr.)
Block-01 Web Applications-I
Getting Started with HTML
Introduction of HTML, writing my first HTML Page, Basic tags used in HTML,
Elements In HTML, Attributes In HTML, Formatting In HTML, Meta Tags and their
UNIT -01
use, commenting a HTML Code, Images and incorporating images, working with
Tables, Working with Lists, working with hyperlinks, Frames and frame management,
Working with Iframes, Working with Block elements.
Advanced HTML
Background images, Coloured text and coloured background, working with fonts, Form
UNIT -02 designing and Form Management, Using Multimedia inside HTML, Marquee Tag,
Headers, Working with Layouts, Role of Tags in Html, Attributes in Html, Event
Handling, MIME Media Types.
Block-02 Web Applications-II
Getting Started With CSS
Introduction of CSS, CSS Syntax, CSS Selectors, Ways To Insert CSS, Background
image handling, Background colour management using CSS, Text management using
UNIT -03
CSS, Font management using CSS, Managing Hyperlinks using CSS, Managing Lists
using CSS, Designing Tables using CSS, Working with the BOX Model, Designing
Borders using CSS, Designing Outline using CSS, Setting Page Margin using CSS.
Getting Started With JS
JavaScript Basics, JavaScript Syntax, Enabling JavaScript in Browsers, Placing
JavaScript, Variables, Operators, Conditional Statement (if, if else), Switch case, Loops
UNIT -04
(while, do while and for loop), Functions, Events and event handling, Cookies, Page
Redirection, Dialog Box (Alert, Confirm, prompt), void keyword, Printing webpage using
JavaScript.
Block-03 Web Technology
Website Development
Websites Overview, Websites Types, Website Designing, Websites Development,
UNIT -01
Website Publishing, Website URL Registration, Website Hosting, Website Security.

HTML-5 & XHTML


HTML-5: Overview, Syntax, Attributes, Events, SVG, MathML, Web Storage, Web
SQL, Server-Sent Events, Web Socket, Canvas, Audio & Video, Geolocation, Micro-
UNIT -02 data, Drag & drop, Web Workers, Indexed DB, Web Messaging, Web CORS, Web RTC.
XHTML: What is XHTML, Why use XHTML, HTML v/s XHTML, XHTML Syntax,
XHTML Events, XHTML Doc types, XHTML Attributes, Difference between HTML4
and HTML5, Difference between HTML and XHTML.
XML
Introduction to XML - eXtensible Markup Language, XML for data centric files,
UNIT -03
Displaying XML on the web, Displaying XML with CSS, XSLT - eXtensible Style
Sheet Language, Displaying XML with XSLT.
Macromedia Flash
What is flash, Starting of Flash., The workspace, Using the Tools panel, Selection
UNIT -04 Tool, Coloring Tool, Text Tool., Create a new Flash Document, animate using Frame,
Symbols and Animation, create a Motion Tween, Shape Tween, Motion Guide Tween,
Working with layers.
2nd Semester
Practical Syllabus (MSCS)
CSPL-13: APPLICATION CYBER SECURITY LAB (2 Credit)
Expt-1 Study of steps to protect your personal computer system by creating User Accounts with
Passwords and types of User Accounts for safety and security.
Expt-2 Study the steps to protect a Microsoft Word Document of different version with different
operating system.
Expt-3 Study the steps to remove Passwords from Microsoft Word

Expt-4 Study various methods of protecting and securing databases.

Expt-5 Study “How to make strong passwords” and “passwords cracking techniques”.

Expt-6 Study the steps to hack a strong password.

CSPL-14: NETWORK CYBER SECURITY LAB (2 Credit)


Expt-1 Study of different wireless network components and features of any one of the Mobile
Security Apps.
Expt-2 Study of the features of firewall in providing network security and to set Firewall Security
in windows.
Expt-3 Steps to ensure Security of any one web browser (Mozilla Firefox/Google Chrome)

Expt-4 Study of different types of vulnerabilities for hacking a websites / Web Applications.

Expt-5 Analysis the Security Vulnerabilities of E-commerce services.

Expt-6 Analysis the security vulnerabilities of E-Mail Application.

CSPL-15: WEB TECHNOLOGY LAB (2 Credit)


Expt-1 Develop static pages (using only HTML) of an online Book store. The pages should
resemble: www.amazon.com.
Expt-2 Validate the registration, user login and user profile pages using JavaScript.

Expt-3 Use frames to Include Images and Videos.

Expt-4 Add a Cascading Style sheet for designing the web page.

Expt-5 Write a program in JavaScript to print the Fibonacci series.

Expt-6 Write a program in JavaScript to perform Arithmetic Operations.


Expt-7 Write a JavaScript function that checks whether a passed String is palindrome or not.
Expt-8 Write a program in html to Click the button to get your coordinates.
Expt-9 Create an XSLT document to meet the following requirements
• Page should have a title Students.
• Page should have a table of student details.
• Columns should have following headers: Roll No, First Name, Last Name,
Nickname, Marks
Expt-10 Write a table using html and CSS to create examination date sheet of OSOU.
3rd Semester
Theory Syllabus
CSP-16: WHITE HAT HACKING (4 Credit)
Block-1 Introduction to hacking
Introduction: Hacking, Types of Hacking/Hackers, Cybercrime, Types of cybercrime,
Hacker Mind set, Threats, Concept of ethical hacking, , Phases involved in hacking,
Unit-1 Role of Ethical Hacking, Common Hacking Methodologies, Profiles of Hackers,
Benefits of Ethical Hacking, Limitations of Ethical Hacking.
Foot Printing & Reconnaissance: Introduction to foot printing, Use of foot printing,
Types of foot printing, Understanding the information gathering process, Information
Unit-2 on a company website, methodology of the hackers, Tools used for the reconnaissance
phase.
System Hacking: System hacking, Types of System hacking, hacking tools, Computer
Hole, Hacking Process, Various methods of password cracking, Remote Password
Unit-3
Guessing, Role of eavesdropping, Keystroke Loggers, Types of Keystroke Loggers,
Detection, Prevention and Removal.
Sniffers: Introduction, Sniffer, Types of Sniffer, Protocols Susceptible to Sniffing,
Unit-4 Active and Passive Sniffing, ARP Spoofing, ARP Spoofing, ARP Poisoning, DNS
Spoofing Techniques, MAC Flooding, Sniffing Countermeasures.
Block -2 Hacking Techniques
Trojans, Backdoors, Viruses, and Worms: Trojans and Backdoors, Overt and Covert
Channels, Types of Trojans, Reverse-Connecting Trojans, Netcat Trojan ,Indications of
a Trojan Attack, Wrapping, Trojan Construction Kit and Trojan Makers ,
Unit -1 Countermeasure Techniques in Preventing Trojans, Trojan-Evading Techniques,
System File Verification Sub objective to Trojan Countermeasures Viruses and Worms,
Difference between a Virus and a Worm, Types of Viruses, Understand Antivirus
Evasion Techniques, Understand Virus Detection Methods..
Session Hijacking: Understanding Session Hijacking, Phases involved in Session,
Unit -2 Hijacking, Types of Session Hijacking, and Session Hijacking Tools.
Social Engineering Social Engineering, Common Types of Attacks, Insider Attacks,
Unit - 3 Identity Theft, Phishing Attacks, Online Scams, URL Obfuscation, Social-Engineering
Countermeasures.
Denial of Service: Denial of Service, Types of DoS Attacks, DDoS Attacks,
Unit -4 BOTs/BOTNETs, “Smurf” Attack, “SYN”, Flooding, DoS/DDoS Countermeasures.
Block -3 Hacking Web applications and Wireless Networks
Unit-1 Hacking Web Applications & SQL Injection: Hacking Web Servers, Types of Web Server
Vulnerabilities, Attacks against Web Servers, IIS Unicode Exploits, Patch Management
Techniques, Web Server Hardening Methods Web Application Vulnerabilities, Objectives
of Web Application Hacking, Anatomy of an Attack, Web Application Threats, Google
Hacking, Web Application Countermeasures Web-Based Password Cracking Techniques,
Authentication Types, Password Cracker, Password Attacks: Classification ,Password-
Cracking Countermeasures.
Unit-2 SQL Injection and Buffer Overflows: SQL Injection, Steps to Conduct SQL Injection, SQL
Server Vulnerabilities, SQL Injection, Countermeasures Buffer Overflows, Types of Buffer
Overflows and Methods of Detection, Stack-Based Buffer Overflows, Buffer Overflow
Mutation Techniques
Unit-3 Hacking Wireless Networks: Introduction to 802.11, Role of WEP, Cracking WEP
Keys, Sniffing Traffic, Wireless DOS, attacks, WLAN Scanners, WLAN Sniffers,
Hacking Tools, Securing, Wireless Networks.
Unit-4 IDS, Firewalls & Honey pots
CSP-17: SECURITY ANALYSIS AND REPORTING (4 Credit)

Block-1 Multidisciplinary Risk Management


Packet Analysis & Risk Management: Introduction, Learning Objectives, Packet
analysis and Packet Sniffers, evaluating a packet sniffer, how packet sniffers work, The
Multidisciplinary Approach, how to protect your sensitive resources? Frame the Threats
and Sources, National Governments, Terrorists, Industrial Spies and Organized Crime
Groups, Hacktivists, Hackers, Nature of the Computer Security Community, GAO
Threat Table, Hierarchy of Needs, Multidisciplinary Risk Management, Solution
Unit-1 strategies, Module 1 – Fundamentals of risk management, Module 2 – Applied
standards and cyber risk management, Module 3 – Field skills on cyber risk
management, Seven Principles of Network Security Analysis Strategy, Network Traffic
Monitoring and Analysis, Importance of Network Monitoring and Analysis, Monitoring
and Analysis Techniques, Router Based Monitoring Techniques, Non-Router Based
Techniques
Wireless Network Analysis: Wireless Networks, Wi-Fi Networks, Wireless Standards,
Wi-Fi Authentication Modes, Wireless Encryption, Break an Encryption, Wireless
Unit-2 Threats, Wireless Hacking Methodology, Wireless Traffic Analysis, Launch Wireless
Attacks, Crack Wireless Attacks. Best practices on using wireless networks. Tips on
internet surfing via public wireless services.
Intrusion Detection & Prevention System: Intrusion Detection System, Types, Passive
system v/s reactive system, Signature Based Detection v/s Anomaly Based Detection,
Signature Based Detection of Worms and Polymorphic Worms, Control Flow Graph
Unit-3 based approach for detecting Polymorphic Worms [2], Tools in intrusion detection,
Needs and challenges, IDS in various domains, Intrusion Prevention Systems (IPS),
Types of IPS, Host based Intrusion Prevention (HIP), Network based Intrusion
Prevention (NIP).
Cyber Crime. IT assets and wireless security: Cybercrime, Overview, Categories,
Challenges, Complexities, Effects, Solutions, How to report an incident?, IT assets and
wireless security, Securing an asset, Steps of securing an asset, Hardware based
Unit-4 security, Types of HSMs, HSM Functionality, How to implement HSM, Firewall,
Types of Firewalls, Software Based Firewalls, Hardware Based Firewalls, How to
prevent your network from anonymous attack., Wireless security, Use of Wi-Fi, Types
of Wireless Security, WPA.
Block -2 Internet Security Analysis
Malware Analysis: Introduction, what is Malware Analysis? The Goals of Malware
Analysis. Malware Analysis Techniques. Basic Static Analysis, Basic Dynamic
Analysis, Advanced Static Analysis, Advanced Dynamic Analysis, Types of Malware,
General Rules for Malware Analysis, Malware Functionality, Downloaders and
Launchers, Backdoors, Reverse Shell, RATs, Botnets, RATs and Botnets Compared,
Unit -1 Credential Stealers, INA Interception, Hash Dumping, Keystroke Logging, Persistence
Mechanisms, Trojanized System, Binaries, DLL Load-Order Hijacking, Privilege
Escalation Using SeDebugPrivilege, Covering Its Tracks-User-Mode Rootkits, IAT
Hooking, Inline Hooking, Tools for malware analysis, ApateDNS, Autoruns, BinDiff,
BinNavi, Deep Freeze.
Email Security Analysis: Threat and Vulnerability analysis of the email system.
Threats: Spam, Social Engineering (phishing, targeted attacks), Massive eavesdropping,
Other targeted criminal acts, Vulnerabilities: Integrity of email communications,
Confidentiality of email communications, Phishing, Types of Phishing, Clone Phishing,
Unit -2 Spear Phishing, Phone Phishing, Phishing Techniques and Countermeasures: Email
Spoofing, Web Spoofing, Pharming, Malware, Phishing through PDF Documents.
Privacy and security countermeasures: Cryptography Overview, Encryption Algorithms,
Key Exchange Algorithms, Signature Algorithms, Certificates.

Vulnerability Assessment and Penetration Testing (VPAT): Introduction, Benefits,


Methodology, Vulnerability Assessment, Reasons for Vulnerability Existence, Steps for
Vulnerability Analysis, Web Application Vulnerabilities, Types: SQL-Injection, Blind
Injection Detection, Cross-Site Scripting, Broken Authentication & Session
Management, Insecure Direct Object References, Failure to Restrict URL, Remote Code
Execution. Vulnerability Assessment Using Acunetix, Working of Vulnerability
Assessment Tool. Penetration Testing Overview: What is Penetration Testing? When to
Perform Penetration Testing? How is Penetration Testing Beneficial? Penetration
Unit - 3 Testing Method: Steps of Penetration Testing Method, Planning & Preparation,
Reconnaissance, Discovery, Analyzing Information and Risks, Active Intrusion
Attempts, Final Analysis, Report Preparation. Penetration Testing Vs. Vulnerability
Assessment, Penetration Testing, Vulnerability Assessment, which Option is Ideal to
Practice? Types of Penetration Testing: Types of Pen Testing, Black Box Penetration
Testing. White Box Penetration Testing, Grey Box Penetration Testing, Areas of
Penetration Testing. Penetration Testing Tools, Limitations of Penetration Testing,
Conclusion.
Social Engineering: Social Engineering, Overview, Definition(s) of Social Engineering.
The Social Engineering Life Cycle: Foot printing, Establishing Trust, Psychological
Manipulation, The Exit. Social Engineering Attack Cycle: Research, Developing
Rapport and Trust, Exploiting Trust Factor, Exploiting Trust Factor, Recruit & Cloak,
Evolve/Regress. The Weapons of a Social Engineer: Shoulder Surfing, Dumpster
Diving, Role playing, Trojan horses, Phishing, Surfing Organization Websites & Online
Unit -4 forums, Reverse Social Engineering. Different Types of Social Engineering: Physical
Social Engineering, Remote Social Engineering, Computer-based Social Engineering,
Social Engineering by Email, Phishing, Nigerian 419 or advance-fee fraud scam, Pop-
up windows / browser interceptions. Social Engineering by Phone, Mumble Attack,
IVR or phone phishing. Detecting / Stopping Social Engineering Attacks. Defending
Against Social Engineering.

Block -3 Cyber Incident Handling and Reporting


Unit-1 Cyber security Incident Management: The Cyber security Incident Chain, Stakeholders,
Cyber security Incident Checklist. Five Phases of Cyber security Incident Management:
Plan and Prepare, Detect and Report, Assess and Decide, Respond and Post-Incident
Activity.
Unit-2 Handling an Incident: Preparation: Preparing to Handle Incidents, Preventing Incidents.
Detection and Analysis: Attack Vectors, Signs of an Incident, Sources of Precursors and
Indicators, Incident Analysis, Incident Documentation, Incident Prioritization& Incident
Notification.
Unit-3 Coordination and Information Sharing: Coordination: Coordination Relationships,
Sharing Agreements and Reporting Requirements. Information Sharing Techniques: Ad
Hoc, Partially Automated, Security Considerations. Granular Information Sharing:
Business Impact Information, Technical Information.
Unit-4 Containment, Eradication, and Recovery: Choosing a Containment Strategy, Evidence
Gathering and Handling, Identifying the Attacking Hosts, Eradication and Recovery.
Post-Incident Activity: Lessons Learned, Using Collected Incident Data, Evidence
Retention.
CSPE-01: Application Development Using PHP (2 Credit)
Block-1 Introduction to PHP
Basics of PHP
Unit-1 Introduction, Algorithm, Flowchart, Program, Programming Languages and its
generation, OOPs Concept.
Introduction to PHP
PHP Basic (installing Process of PHP (XAMPP)), Structure of PHP program,
Unit-2 Write the first PHP program, Syntax, Variables, Constants, Echo and Print
Command, Data Type, Array Data Type, Types of Array in PHP, Multi
dimension Array, Object data Type.
Operations: Basics and types of operation in PHP.
Block -2 PHP
Condition Statement (if Statement, if else statement, if else if else
Unit -3 statement, Switch Statement), Loop (While, do While, for and for each
Loop). Super global Variable.
Form Management
Form Design: get and Post method, Working with Textbox, Text Area,
Password, Check Box, Radio Buttons, drop down Box, File, Submit Buttons,
Unit -4 Reset, Button, data, date Time, Email, search, Tel, URL etc.
Working with $Globals, $Server, $ENV, $SESSION, $COOKIE with
Example. Form Validation, Form Navigation

Block -3 Advance PHP


Unit-1 (Object Oriented Concept in PHP)
Introduction, Basics of OOP in PHP, Pillars of OOPS, Understanding Classes
and Objects, PHP Class Properties and Methods, Static, Constants, Constructor
and destructor, Magic Methods in PHP, Inheritance in PHP, Interface, Abstract
class, Final, Polymorphism

Unit-2 (File management and Exception Handling)


Introduction, what is File, File Formats supported by PHP, File Operations,
File Permission.
Error Handling in PHP, Exception Handling, try… catch and throw, Top Level
Exception Handler, User Defined Exception Handler

Unit-3 (Database Connectivity in PHP)


Introduction, Introduction to MySQL, what can MySQL do? Why MySQL use
with PHP, Features of MySQL, Communication between PHP and MySql
Server: Create a connect to the MySql server (mysql, mysqli (MySQL
improved, pdo (PHP Data Object)), Create Database and Tables in MySql,
Insert Data into MySql Server, Mysql SELECT Statement, Update MySql
Records, Delete MySql Records, Example database access from Webpage.
3rd Semester
Practical Syllabus

CSPL-16: WHITE HAT HACKING LAB (2 Credit)


Expt-1 To learn about hacking tools and skills.
Expt-2 To study about Footprinting and Reconnaissance.
Expt-3 To study about Fingerprinting.
Expt-4 To study about system Hacking.
Expt-5 To study about Wireless Hacking.
Expt-6 To learn & study about Sniffing & their tools.

CSPL-17: SECURITY ANALYSIS AND REPORTING LAB (2 Credit)


Expt-1 Study various methods for Taping into the wire.
Expt-2 Study the steps for installing Wireshark, the packet-sniffing tool for performing Network
analysis.
Expt-3 Study of working with captured packets.
Expt-4 Study of advanced Wireshark features.
Expt-5 Study of security packet analysis.
Expt-6 Study of Operating System Fingerprinting.

CSPEL-01: APPLICATION DEVELOPMENT USING PHP LAB (2 Credit)

Expt-1 Show the steps to install XAMM Software for PHP Programming.

Expt-2 Write a PHP program to display a digital clock which displays the current time.
Write the PHP programs to do the following:
a. Implement simple calculator operations.
Expt-3 b. Find the transpose of a matrix.
c. Multiplication of two matrices

Expt-4 Write a PHP program to Swapping two numbers

Expt-5 Write a PHP program to create a login table.

Expt-6 Write a PHP program for login page using database connectivity

Expt-7 Write a PHP program to find a word in a file.

Expt-8 Write a PHP program to upload an image to the data base.

Expt-9 Write a PHP program to design a registration for with proper validation

Write a program states whether a year is leap year or not from the specified range of years
Expt-10 (1991 - 2016). using Exception Handling.

CSPP-04: PROJECT WORK (4 Credit)


4th Semester
Theory Syllabus
CSP-18 Computer Forensics (04 Credit)
Block-01 (Introduction to Computer Forensics)
UNIT – 1: INTRODUCTION TO DIGITAL FORENSIC
Learning Objectives, Introduction. Definition of Computer Forensics, Cybercrime, Evolution of
Computer Forensics, Different types of digital forensics, Stages of Computer Forensics Process,
need of computer forensics, Rules of Computer Forensic, Computer Forensics Team, Forensics
Readiness, what is Forensics Readiness? Goals of Forensic Readiness, Benefits of Forensic
Readiness, Steps for Forensic Readiness Planning

UNIT – 2: COMPUTER FORENSICS INVESTIGATION PROCESS


Introduction to computer crime investigation, Initial decision-making process, Assess the
situation, notify decision-makers and acquire authorization, Review policies and laws, identify
investigation team members, conduct a thorough assessment, prepare for evidence acquisition,
Acquire the data, Analyze the data, Report the investigation

UNIT – 3: DIGITAL EVIDENCE AND FIRST RESPONDER PROCEDURE


Digital Evidence, Locard’s Principle, Best Evidence Rule, Characteristics of Digital Evidence,
Stages in Digital Evidence Investigation Process, first responder toolkit, Issues Facing
Computer Forensics, Types of investigation, Techniques of digital Forensics

UNIT – 4: UNDERSTANDING STORAGE MEDIA AND FILE SYSTEM


hard disk drive, details of the internal structure of HDD, low-level formatting, high-level
formatting, the booting process, Linux boot process, mac os boot sequence, boot sequence in
windows, file system

Block-02 (Windows & Network Forensics)


UNIT – 1: WINDOWS FORENSICS
Introduction, Background and need for Window forensics, Major forensic areas in windows,
recovering deleted files and partitions, Anatomy of a disc drive, Data organization in Windows,
retrieving deleted files, retrieving cached files, retrieving files in unallocated space, more about
recovering lost files/data

UNIT – 2: LOGS & EVENT ANALYSIS AND PASSWORD CRACKING


Introduction, windows registry, Registry and forensics, windows event log file, Windows Event
Log File Format, reading from a Windows event log file, Using Microsoft log parser,
Understanding Windows user account management logs, Understanding Windows file and other
object Access sets, Auditing policy change, windows password storage, application passwords
crackers

UNIT – 3: NETWORK FORENSICS


Introduction, network components and their forensics importance, OSI, forensics information
from network, Intrusion detection/ prevention system, Wireless Access Points, log analysis,
analyzing time stamps, analyzing data, forensics tools, Network tools used for forensics,
Software tools used for network forensics

UNIT – 4: WIRELESS ATTACKS


Introduction, wireless fidelty (wi-fi) (802.11), Capturing 802.11 frames, wireless security,
Attacks, wireless attacks detection techniques, Wireless Access Point Monitoring, Wireless
Client/Node Monitoring, General Wireless Traffic Monitoring, wireless intrusion detection
systems, Snort-wireless, WIDZ, Bro
Block-03 (Forensic Investigation & Reporting)
UNIT – 1: INVESTIGATING WEB ATTACKS
Introduction, Cyber-attack, Cyber Warfare and cyber terrorism, types of web attacks, Spoofing,
Repudiation, Privacy attack, Denial of Service, Privilege escalation, SQL Injection Attacks, web
attack forensics, Web services forensics, Web Application Forensics, Preliminary Analysis,
Website traffic analysis, web application forensics tools, Logparser, EventLog Analyzer, Web
log analyzer, Open Web Analytics, Webalizer

UNIT – 2: INVESTIGATING EMAIL ATTACKS


Introduction, Email Structure, Types of email services, Simple Mail Transfer Protocol, email
attacks and crimes, Flaming, Email spoofing, Email bombing, Email hacking, Spams, Phishing,
Email fraud, Phishing emails, privacy in emails, Email privacy, Email tracking, email forensics,
email forensic tools

UNIT – 3: MOBILE DEVICE FORENSICS


Introduction, challenges in mobile forensics, mobile communication, 802.11or WiFi, Bluetooth,
Infrared (IrDA), evidences in a mobile device, mobile forensic process, Seizure, Acquisition,
Examination and Analysis, forensic acquisition tools, Hardware acquisition tools, Software
acquisition tools

UNIT – 4: INVESTIGATIVE REPORTS, EXPERT WITNESS AND CYBER


REGULATIONS
Introduction, REPORT PREPARATION, Gathering the data, Analyzing the results, Outlining
and organizing the report, Writing and Revising a Rough Draft, Expert Witness, finding an
expert, What Can (and Can’t) an Expert Do? Use an Expert, LEGAL ASPECTS OF
COMPUTING, Jurisdiction, Net neutrality, Open Internet, Indian Information Technology Act
(IT Act) 2000, Amendments– Indian IT Act (2008)
CSP-19: Cyber law and Regulation of Cyberspace (04 Credit)
Block-01: Laws and Entities Governing Cyberspace
UNIT-1: DOMESTIC LAWS: BACKGROUNDER
Challenges to Laws, Information Technology Act, 2000, A Quick Overview of the Act,
Critiques of the I.T. Act, Proposed Amendments to the I.T. Act

UNIT-2: INFORMATION TECHNOLOGY ACT – (PART I)


Statement of Objects and Reasons, Application of the Act – The Extra-Territorial Effect, Digital
Signatures (Chapters II, V, VI, VII, VIII), Controller of Certifying Authorities, License to Issue
Digital Signature Certificates, E-governance (Chapter III), Functional-Equivalent Approach,
Legal Recognition of Electronic Records, Legal Recognition of Digital Signatures, Use of
Electronic Records and Digital Signatures in Government and its Agencies, Retention of
Electronic Records

UNIT-3: INFORMATION TECHNOLOGY ACT – (PART II)


Adjudication (Chapter IX), Adjudicating Officer, Cyber Regulations Appellate Tribunal,
Penalties and Offences (Chapter IX & XI), Penalties, Offences, Investigation, Network Service
Provider Liability (Chapter XII), Amendments to Certain Statutes, Amendments to the Indian
Penal Code, 1860, Amendments to the Indian Evidence Act, 1872

UNIT-4: INTERNATIONAL TREATIES, CONVENTIONS AND PROTOCOLS


CONCERNING CYBERSPACE
United Nations Commission on International Trade Law, World Summit on Information
Society, United Nations Commission on Trade and Development, Council of Europe, World
Trade Organization, World Intellectual Property Organization

UNIT-5: GUIDELINES ISSUED BY VARIOUS MINISTRIES


Broadband Policy, 2004, .IN Internet Domain Name – Policy Framework, Draft Policy
Guidelines on Web-site Development, Hosting and Maintenance, New Telecom Policy 1999
(NTP 1999), Information Technology Security Guidelines, SEBI Guidelines on Internet-based
Trading and Services, Guidelines for Setting up of International Gateways for Internet

Block-02: Computer Wrongs & Cyber Torts


UNIT-6: INTRODUCTION TO COMPUTER WRONGS
Computer Wrongs, Classification of Computer Crimes, Commission of Multiple Computer
Wrongs, Challenges to Laws, Technology-neutral and Technology-based Laws, Regulation
Versus Freedom on the Internet, Internet Crime Different from other Technology Crimes,
Information Technology Act, 2000, Offences Under the IT Act, Investigation Under the IT Act,
Convention on Cyber Crime – Council of Europe

UNIT-7: CONVENTIONAL CRIMES THROUGH COMPUTER


Cyber Defamation, Digital Forgery, Cyber Pornography, Cyber Stalking/Harassment, Online
Gambling, Indian Law, Online Sale of Illegal Articles

UNIT-8: CRIMES AND TORTS


Hacking/Unauthorized Access, Denial of Service, Crimes Relating to Electronic Mail: E-mail
Spamming/E-mail Bombing, Crimes Relating to Electronic Mail: E-mail Spoofing, Indian Law,
Cyber Crime Convention of the Council of Europe

UNIT-9: CRIMES RELATING TO DATA ALTERATION/DESTRUCTION


Internet Fraud and Financial Crimes, Virus, Worms, Trojan Horses and Logic Bombs, Theft of
Internet Hours, Salami Attacks, Data Diddling, Indian Law, Steganography
Block-03: Dispute Resolution in Cyberspace
UNIT-10: ISSUES OF JURISDICTION AND APPLICABLE LAW IN
CYBERSPACE
Jurisdiction in Cyberspace, Theories of Jurisdiction in Criminal Cases, General Jurisdiction in
Computer Crimes, Application of ‘Effects’ Doctrine in Computer Crimes, Convention on Cyber
Crime – Council of Europe, Applicable Law in Computer Crimes

UNIT-11: ENFORCEMENT ISSUES IN CYBERSPACE


Prevention, Deterrence as a Means of Prevention, Technology as Aid to Prevention, User
Awareness, The IT Act and Prevention of Offences, Detection of Crime, Use of Cyber
Forensics, On-going Efforts in India

UNIT-12: ONLINE DISPUTE RESOLUTION


Alternative Dispute Resolution, Information Technology, Online Dispute Resolution,
Functioning of the Online Dispute Resolution (ODR) System, Kinds of Disputes Handled in an
ODR Environment, Communication Modes in ODR, Kinds of ODR, Generating E-confidence –
Disclosure-based Approach, Legal Concerns
CSPE-02: Programming in Java (04 Credit)
Block-01(Introduction to Java)
UNIT-01
Introduction, History of Java, Edition of Java, what is Java, Why Learn Java, Languages and Paradigms, The
Basics of Java, Java Features, OOPS Concepts, Evolution of Java, How Java program works, Difference
Between C++ and JAVA, Java and Internet, Java and World Wide Web, Java Support System, Java
Environment, Components of JDK, Components of API (Application Programming Interface)
UNIT-02
Java Program Structure, Simple Java Program, Tokens, Reserved Keywords, Identifiers, Literals,
classification of Java Statements, JVM Architecture, How Does the JVM Work, Constants and Variables,
Variables, Declaration of Variables, Scope of Variable, Data type, symbolic Constant, Default Values, Type
Casting, Command line arguments
UNIT-03
Operators, Different types of Operators, Unary Operator, The Arithmetic Operator, The Relational
Operators, The Logical Operator, Conditional Operators, The Assignment Operators, The Bitwise Operators,
Special Operators, Instanceof Operator, Dot operator, new operator, Precedence of Java Operators
Keyboard input programming: Using InputstreamReader class, Scanner class, CLA, Console class
UNIT-04
Sequence Control, Implicit and Explicit Sequence Control, Control Statements, Selection Statements, if-
Then Statement, If-Then-Else Statement, Switch Statement, Repetition Statements, While Statement, Do-
While Loop Statements, for Loop Statements, Java Jump Statements, Break Statement, Continue Statement,
Return Statements, Labeled Loop
Block-02(OOPs Concept in Java)
UNIT -01
Arrays and Strings: Introduction, Overview of Array, Need of Array, Types of Array, One dimensional
Array, Two-Dimensional Array, Multidimensional Array, Strings, Concatenation of Strings, Methods for
String Comparison, Methods for searching Strings, Changing the case of characters, String Buffer, String
Builder
UNIT-02
Classes: Introduction, Defining a Class, Adding Variables, Adding Methods, Creating Objects, Accessing
Class members, Call-by-value and call by reference, Recursion, Access Control Constructors, Method over
Loading, Constructor Overloading, Garbage Collection, finalize( ) method, this keyword, Static Members,
Nesting of Methods
UNIT-3
Inheritance: Inheritance, Single Inheritance, Multilevel Inheritance, Multiple Inheritance, Hierarchical
Inheritance, Using Super, Constructor -Order of Execution in Inheritance, Overriding methods, Final
variables and methods, Final Classes, Abstract methods and Classes, Containership, Visibility Control
UNIT-4
Wrapper Classes And Vectors: Introduction, Wrapper Classes, Number Class, Byte class, Short class,
Integer class, Long class, Converting Numbers to and from Strings, Float class, Double class, Character
class, Boolean class, Vectors, Creating a vector
Block-03(Advanced Concept in Java)
UNIT -01
Interface & Packages: Introduction, Interfaces, Defining interface, Implementing interface, Accessing
interface method, Accessing interface variable, Extending interfaces, Packages, System packages, Using
system packages, User-defined packages, Adding class to a package, Accessing and using package
UNIT-02
Exception Handling: Introduction, Exceptions, Using try& catch, multiple catch clauses, Finally, Throw,
Throws
UNIT-03
Applets: Introduction, Local & remote applets, Applet vs. applications, Writing applets, Life cycle of an
applet, Creating source code of applet, Creating an executable applet, Creating applet tag, Adding applet tag
to HTML, Running the applet, Detailed form of applet tag, Passing parameters to applet, Aligning the
display, HTML tags, Getting input from user.
UNIT-04
Multithreading in Java:
Introduction, Multithreading, Uses of Multithreading, The Main Thread, Creating and Running Threads,
How to terminate a Threads, Multiple Task using Single Threads, Multiple Task using Multiple Threads,
Multiple Task using Multiple Threads and Single Object, Threads Synchronization, Threads Priority, Thread
Methods, Threads Communication, Threads Life Cycle
CSPE-03: Programming in Python (02 Credit)
Block-01: Introduction to Python
UNIT-1: FUNDAMENTAL OF PYTHON
What is the program, Need for Programming Languages, Programming Languages, Examples of
Programming languages, The Programming Process, Introduction to Python, Common Uses, History of
Python Language, Development Steps of Python, Features of Python, Version of Python, Why Python,
Applications for Python, Download and installation of Python on Windows, The First Program

UNIT-2: VARIABLES, EXPRESSIONS AND STATEMENTS


Values and types, Variables, Variable names, keywords, Constants and Identifiers, Data Type in Python,
Type Casting in Python (Type Conversion), Operators and operands, Expressions and Statements,
Interactive mode and script mode, Order of operations, Comments in Programming, Debugging, Input,
Output and Import in Python, Conditional statements/Selection Structure, Iteration Structure, How to
Use Break, Continue, and Pass Statements

UNIT-3: FUNCTIONS IN PYTHON


Why Functions, Write a function definition, How to call a function in Python, Flow of Execution,
Functions with arguments (Parameters and arguments), Different Argument types used in Python, void
Functions, Functions with return statements, Using main() as a Function, Built-in functions, Type
Conversion functions, Math functions,

UNIT-4: STRING
Strings in Python, String formatting, Escape Sequences, String Operations and Methods, Strings are
immutable, The ‘in’ operator, Boolean Methods, Parsing strings

Block-02: Advanced concept in Python


UNIT-1: Object-oriented Programming in Python
Overview of object-oriented programming (OOP), Basic concepts of objects and classes, Constructor in
Python ( __init__ ), Inheritance in Python, Overriding Parent Methods, super() Function, Multiple
Inheritance, Multilevel Inheritance, Data Encapsulation

UNIT-2: Error and Exception Handling


Syntax error, Runtime errors 2.4 Semantic errors, Syntax Errors v/s Exceptions, Exception Handling,
Catching Specific Exceptions in Python, the except Clause with Multiple Exceptions, Python the
try/finally Statement, Raising an Exception, User-Defined Exceptions

UNIT-3: File Handling in Python


What is a File? File Formats Support by Python, File Operations, opening a File, closing a File, Read
and Write Files, Read the file as a single string, Read the file line by line, writing a File, Searching
through a file, Python Pickle

UNIT-4: Numpy in Python


Operations using NumPy, Why NumPy instead of lists? Importing numpy, how to install Numpy in
PyCharm, Common functions of numpy, Simple Program using Numpy/ 1D Array, How Numpy is
better than Lists in terms of Memory Management, How Numpy is faster and more convenient than
Lists in terms of Time, Operations on Arrays, Array Arithmetic, Arithmetic Operations, Aggregation
4th Semester
Practical Syllabus

You might also like