AI 403 Cyber Security and Forensics
AI 403 Cyber Security and Forensics
Learning Outcomes:
After successful completion of the course students will be able to
Understand the cyber space and requirement of cyber security.
Implement the access controls in cyber space.
Explore the Intrusion detection & prevention systems and firewalls.
Analyse the different types of cryptographic and forensic methods.
Identify and solve different cyber security threats.
Section-A
Section-B
Internet Security: Transport security: TLS, SSL, IPSec., Email security, Secure
Electronic Transaction (SET), Web Security, Introduction to Network Simulator
Netsim, NS2/NS3, Cooja.
Access Control: Access Control Principles, Subjects, Objects, and Access Rights,
Discretionary Access Control, Role-Based Access Control, Attribute-Based Access
Control, Identity, Credential, and Access Management
Intrusion Detection: Intruders, Intrusion Detection, Analysis Approaches, Host-Based
Intrusion Detection, Network-Based Intrusion Detection, Distributed or Hybrid
Intrusion Detection, ML-based IDS, Network Traffic Monitoring, Intrusion prevention
system (IPS), Firewalls, Types of firewalls.
Section-C
Security Auditing: Internal Audit and IT Audit Function, Identifying information
assets, Risk assessment, Risk management, ISO 27001 PCIDSS.
Cyber Forensics: Windows Forensic Analysis: Window artifacts, Evidence volatility,
System time, Logged on user(s). Open files, MRUs, Network information, Process
information, Service information. Cybercrime investigation: incident response,
Vulnerability analysis, Penetration Testing, etc CDR Analysis.
Cyber Law: Introduction to cybercrime and cyber law, International Cyber Law, IT Act
2000/2008, offences under IT Act, Intellectual Property right. Cyber Security
Standards, National Cyber Law, National Cyber Security Policy 2013.
Suggested Books:
1. Computer security principles and practice, William Stallings, Lawrie Brown, third
edition, Prentice-Hall, 2011
3. Bill Nelson, Amelia Phillips, FEnfinger and Christopher Stuart, “Guide to Computer
Forensics and Investigations, 4th ed., Thomson Course Technology, 2010.