0% found this document useful (0 votes)
95 views5 pages

Cyber Security Course

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views5 pages

Cyber Security Course

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

COURSE NAME CATEGORY L T P CREDIT

COURSE
NUMBER

CY22C03 IT FUNDAMENTALS FOR CYBER THEORY 71 4 - 5


SECURITY AND CRYPTOGRAPHY
Preamble
This course provides the fundamentals of computers and understanding the key issues associated with
protecting information assets. The purpose of the course is to provide an overview of the field of cyber
security, cybercrime and information assurance.
Course Learning Outcomes
On the successful completion of the course, students will be able to
CLO CLO Statement Knowledge
Number Level
CLO1 Recall the concepts of input and output devices, Information Security K1
CLO2 Understand the concepts of Number systems, importance and K2
challenges in Cyber Security.
CLO3 Develop the applications by cyber security tools. K3
CLO4 Analyze & implement the real- time applications by Cyber Security
tools. K4

Mapping with Programme Learning Outcomes

CLOs PLO1 PLO2 PLO PLO PLO


3 4 5
CLO1 S M S S M

CLO2 S S S S M

CLO3 S M M S S

CLO4 S M S S S

S- Strong; M-Medium; L-Low

IT FUNDAMENTALS FOR CYBER SECURITY AND CRYPTOGRAPHY 71Hrs

Syllabus

UNIT I (12 Hrs)


Introduction: Generations of Computer, Types of Computer - Functional units of a computer system-
Input Devices -Output devices – Memory – Storage Devices. Number Systems: Decimal, Binary,
Octal and Hexadecimal – Conversion –Computer Codes- Binary Addition, Subtraction-
Complements.

UNIT II (13 Hrs)


Information security: History of IS-What is security -characteristic of IS-components of an
Information system –Security System Development Life Cycle model. – Information Security for
technical Administrators: server security- network security

UNIT III (14Hrs)


Introduction to Cyber Security: Importance and challenges in Cyber Security - Cyberspace - Cyber
threats - Cyber warfare - CIA Triad - Cyber Terrorism - Cyber Security of Critical Infrastructure -
Cyber security -Organizational Implications.

UNIT IV (15 Hrs)

Cryptography: Concepts and techniques-Plain text and cipher text- Encryption Principles-Cryptanalysis.
Authentication methods-passwords-keys versus passwords-Attacking Systems via passwords-Password
verification
UNIT V (17 Hrs)

Applications of cryptographic Hash Functions: Message authentication- Digital Signatures-Other


Applications-Two simple Hash Functions-Cyber Security tools.
.

Text Book

Year of
S.No Author Title of the Book Publishers
Publication

1.
PKSinha Computer 8th Edition, BPB 2004
&PritiSinha Fundamentals Publications

2 Donaldson, S., “Enterprise Cyber


Siegel, S., security -How to Build a A Press, 1st edition 2015
Williams, C.K., Successful Cyber defense
Aslam, A Program against
Advanced Threats
3 Nina Godbole, Cyber Security Willey 2011
Sumit Belapure
4 William Cryptography and
Stallings Network Security: PHI 7th Edition, 2020
Principles and Practices

Reference Books

Year of
S.No Author Title of the Book Publishers
Publication

Information Security 2009


1 Devan N. Shah Wiley India
Principles and Practice

George
K.Kostopoulous Cyber Space and
2 CRC Press 2013
Cyber Security

Pedagogy
• Chalk and talk PPT, Discussion, Assignment, Demo, Quiz, Case study.

Course Designer
Dr.J.Maria Shyla
COURSE
COURSE NAME CATEGOR L T P CREDIT
NUMBER
Y

CY22CP2 Cyber Security tools Lab PRATICAL - - 75 3

Preamble
The course is designed to develop application using Cyber Security tools. It helps to apply the
concepts of Cyber Security in different applications. The course also covers basic concepts of
networks.

Course Learning Outcomes


On the Successful Completion of the course, students will be able to

CLO Knowledge
CLO Statement
Number Level
CLO1 Recall the concepts of network layers. K1
CLO2 Develop programs with implementation of cyber security tools. K2
CLO3 Construct programs K3
CLO4 Implement the real-time applications by cyber security tools. K4

Mapping with Programme Learning Outcomes

CLOs PLO1 PLO2 PLO3 PLO4 PLO5


CLO1 S S M S M

CLO2 S S S S M
CLO3 S S M S S

CLO4 S S S S S

S- Strong; M-Medium; L-Low

Cyber Security tools Lab 75 Hrs

Program List

• Set up Kali Linux in a virtual machine and set up a network Adapter.


• Scan the network for Kali Linux and Windows target machines in local network and virtual
network.
• Identify the open ports using NMAP.
• Sniffing using Wireshark Tool.
• Use password guessing tools to guess a ZIP file password.
• Extract password hashes from Windows machines.
• Experiments on metasploit framework.
• Website Information Gathering techniques
• Prevention against cross site scripting attacks.
• Experiments on SQL injections.

Pedagogy
Demonstration of working environment/Tools/Software/Program

Course Designer
Dr.R.Divya

You might also like