Maulana Abul Kalam Azad University of Technology, West Bengal
(Formerly West Bengal University of Technology)
Syllabus for B. Tech in Computer Science & Engineering
(Applicable from the academic session 2020-2021)
Cyber Security
Code: PEC-CS702E
Contact: 3L
Name of the Course: Cyber Security
Course Code: PEC-CS702E Semester: VII
Duration: 6 months Maximum Marks: 100
Teaching Scheme Examination Scheme
Theory: 3 hrs./week Mid Semester exam: 15
Tutorial: NIL Assignment and Quiz: 10 marks
Attendance: 5 marks
Practical: NIL End Semester Exam: 70 Marks
Credit Points: 3
Objective:
1 To develop an understanding of modern network architectures from a design and
performance perspective.
2 To introduce the student to the major concepts involved in wide-area networks
(WANs), local area networks (LANs) and Wireless LANs (WLANs).
3 To provide an opportunity to do network programming
4 To provide a WLAN measurement ideas.
Unit Content Hrs/Unit Marks/Unit
Introduction: Introduction to Cyber Security,
1 Importance and challenges in Cyber Security, 6
Cyberspace, Cyber threats, Cyberwarfare, CIA
Triad, Cyber Terrorism, Cyber Security of Critical
Infrastructure, Cybersecurity - Organizational
Implications.
Hackers and Cyber Crimes: Types of Hackers, 7
2 Hackers and Crackers, Cyber-Attacks and
Vulnerabilities, Malware threats, Sniffing, Gaining
Access, Escalating Privileges, Executing
Applications, Hiding Files, Covering Tracks,
Worms, Trojans, Viruses, Backdoors.
Ethical Hacking and Social Engineering: Ethical 8
3 Hacking Concepts and Scopes, Threats and Attack
Vectors, Information Assurance, Threat Modelling,
Enterprise Information Security Architecture,
Vulnerability Assessment and Penetration Testing,
Types of Social Engineering, Insider Attack,
Preventing Insider Threats, Social Engineering
Targets and Defence Strategies.
17
PG
Maulana Abul Kalam Azad University of Technology, West Bengal
(Formerly West Bengal University of Technology)
Syllabus for B. Tech in Computer Science & Engineering
(Applicable from the academic session 2020-2021)
Cyber Forensics and Auditing: Introduction to Cyber 10
4. Forensics, Computer Equipment and associated
storage media, Role of forensics Investigator,
Forensics Investigation Process, Collecting Network
based Evidence, Writing Computer Forensics
Reports, Auditing, Plan an audit against a set of
audit criteria, Information Security Management
System Management. Introduction to ISO
27001:2013
5 Cyber Ethics and Laws: Introduction to Cyber Laws, 5
E-Commerce and E-Governance, Certifying
Authority and Controller, Offences under IT Act,
Computer Offences and its penalty under IT Act
2000, Intellectual Property Rights in Cyberspace. at
Network Layer-IPSec.
Text book and Reference books:
1. Cyber security , Nina Gobole & Sunit Belapune; Pub: Wiley India.
2. Information Security and Cyber Laws, Pankaj Agarwal
3. Donaldson, S., Siegel, S., Williams, C.K., Aslam, A., Enterprise Cybersecurity -How to
Build a Successful Cyberdefense Program Against Advanced Threats, A-press
4. Nina Godbole, SumitBelapure, Cyber Security, Willey
5. Hacking the Hacker, Roger Grimes, Wiley
6. Cyber Law By Bare Act, Govt Of india, It Act 2000.
7. Information Security & Cyber Laws, Gupta & Gupta, Khanna Publishing House, (AICTE
Recommended Textbook- 2018)
--------------------------------------------------------------------------------------------------------------------
-----------
Operation Research
Code: OEC-CS701A
Contact: 3L
Name of the Course: Operation Research
Course Code: OEC-CS701A Semester: VII
Duration: 6 months Maximum Marks: 100
18
PG