NM4-Cyber Security CourseMetrics
NM4-Cyber Security CourseMetrics
Outcome Project Details Criteria Criteria Evaluation Details Marks Marks Maximum Marks MCQ
for Obtained
Criteria
Design and Develop Cybersecurity Basics Exploration Wireshark(Virtual Set up a basic network using virtual machines. 5 25 MCQ
Security Measures Machine) Knowledge ONLINE
Overview of Cybersecurity and Types of Cyber Attacks a Install and configure Wireshark for network analysis. 10
TEST
Security Policies and Procedures & Ethical Hacking and Create and enforce simple security policies. 10
Legal Considerations
Test potential risks and Network Security pfSense (Firewall) Configure a firewall to filter network traffic. 5 25
vulnerabilities Firewall Configuration and Management ,OpenVPN (VPN) Set up and test an Intrusion Detection System. 10
Knowledge
Intrusion Detection and Prevention Systems (IDPS) Implement basic VPN configurations & Secure a wireless 10
network.
Virtual Private Networks (VPNs) and Wireless Security
Create Apply Vulnerability Assessment and Penetration Testing OpenVAS(Vulnerabilit Conduct a vulnerability assessment using OpenVAS. 5 25
Cryptographic y Scanning) &
Solutions Vulnerability Assessment & Penetration Testing OWASP tools Perform a penetration test on a simulated environment. 10
Methodologies Knowledge
Exploitation Tools and Techniques and Web Application Use Metasploit for ethical hacking and Secure a web 10
Security application using OWASP principles.
Design Employ Ethical Intrusion Detection System (IDS) Snort(IDS) Understand the concept of Intrusion Detection Systems. 5 25
Hacking Techniques Knowledge
Create Snort configuration files specifying network Install and configure Snort as an IDS. 10
interfaces, rules directory, and other settings
Create the latest Snort rules from the Snort website and Test the IDS by simulating various network attacks 10
update the rules directory.
Build a model based Unified Threat Management Firewall, VPN, NM, Set up a UTM appliance in a virtual environment 20 70 30
on security concepts OWASP ,Sophos UTM
Explore the features of Unified Threat Management Configure firewall rules, IPS, antivirus, and web filtering. 25
system
Test the UTM by accessing malicious websites and simulating 25
Configure a UTM appliance. attacks and generating the reports.
Faculty Signature