K72T002 0cur
K72T002 0cur
K72T002 0cur
FOR
NVQ LEVEL 5 NATIONAL DIPLOMA COURSE
IN
INFORMATION AND CYBER SECURITY TECHNOLOGY
(CBT Curriculum Code: K72T002)
Validated by:
National Apprentice and Industrial Training Authority
Sponsored by
Sri Lanka Computer Emergency Readiness Team/Coordination Center
Ministry of Technology
25.02.2022
PREFACE
This curriculum outline is based on National Competency Standards for information and Cyber
Security Technology (competency standard code: K72T002) which specified the skills need of
the industry at NVQ Level 5. This is the national curriculum which facilitates the teaching and
learning process in Competency Based Training (CBT) mode for NVQ Level 5 National Diploma
programmes under National Vocational Qualification (NVQ) Framework.
The Curriculum outline was developed in consultation with relevant industry experts, it was
validated by the National Industrial Training Advisory committee (NITAC) and endorsed by the
Tertiary and Vocational Education Commission (TVEC). It is expected to review and revise this
document on completion of 3 years. However, all are welcome to point out any shortcomings
and propose improvements to this curriculum
In order to implement this curriculum, Training providers are welcome to adopt this curriculum
with TVEC accreditation and Competency Based assessment. We appreciate the technical
contribution and other support made by the members of the development group and National
Industrial Training Advisory Committee, supervisory staff and other supporting staff involved in
development work. We note with gratitude the hard work done by staff of institutions involved
to compete this document.
1
ACKNOWLEDGMENT
Overall Direction
Mr. Tharanga Naleen Chairman, National Apprentice & Industrial Training Authority
Gamlath
Dr. K. A. Lalithadheera Director General, Tertiary & Vocational Education Commission
Mrs. R.M.A.P. Directress (Quality), National Apprentice & Industrial Training Authority
Samaradivakara
Development Committee
Mr. Chamara Rupasinghe, Chief Executive Officer
Flix 11 (Pvt) Ltd
2
Facilitator (Development)
Eng. P.N.K. Dias
Consultant
Coordinator (Development)
Mr. W.G. Saman Kumara, Assistant Director, Tertiary & Vocational Education
Commission
National Industrial Training Dr. Rasika Dayaratne, Senior Lecturer – University of Colombo
Advisory Committee (NITAC)
Mr. Kavinga Yapa Abeywardana, Lecturer - SLIIT Sri Lanka
Dr. Kanishka Karunasena, Head of Research, Policy and Projects – Sri Lanka
CERT | CC
Coordinator (Validation)
Ms. T.M.H.P. Tennakoon, Inspector (SSCD)
National Apprentice and Industrial Training Authority
3
Competency Based Training Curriculum
for NVQ Levels 5 National Diplomas in
INFORMATION AND CYBER SECURITY TECHNOLOGY
Training providers are required to meet following conditions in order to implement NVQ level5 & 6
diplomas;
i. Credit Policy
NVQ Level 5 and 6 programmes should have minimum 60 credits (1500 Notional Hours) and 120
minimum credits (3000 notional hours) respectively as details given below.
Note: one credit is equivalent to 25 notional hours which include class room teaching, tutorials,
assignment, projects, on the job training and self-study.
Credit policy defines the minimum course content. Training providers could add any more subjects
above modular requirements of the qualification packages.
List of Units consists of Core Technical Units, Electives and Employability Units.
4
Electives : Units to be added to make total credits
equivalent to 60 if total credits of Core Technical
Units and Employability units is less than 60.
Training providers are required submit a proposal based on Guideline 01 – “Criteria on Requirements to
conduct NVQ Level 5 & 6 Programmes” which could be downloaded from TVEC website and obtain
approval from TVEC to establish the course.
Relevant NVQ Level 4 Qualification or 3 passes at GCE (A/L). Details of relevant NVQ 4 and subjects
of GCE (A/L) relevant to this course could be obtained from TVEC. Bridging modules should be
organized as required in the pre-requisites in modules.
v. Upon establishment of the course, obtain TVEC Accreditation and Install a Quality Management
System.
vi. Conduct continuous assessment and maintain a progress record book.
vii. Written test at the end of each semester conducted by the training institute, with paper
moderation by TVEC. Pass Mark for written tests is 50%.
viii. Three Months on the job training on completion of both NVQ Level 5 and NVQ Level 6
programmes respectively.
ix. Competency Based Assessment (Final Assessment) by NVQ Level 5 & 6 Assessors assigned by
TVEC.
x. Certificates are issued by TVEC with the signature of the Director General of TVEC and Head and
Officer responsible for assessment at the training centre.
5
Competency Based Training Curriculum
for NVQ Levels 5 National Diploma in Information and Cyber Security
Technology
(CBT Curriculum Code: K72T002)
6
MODULE STRUCTURE
NVQ Level 5 Qualification
Semester 1
Lectures/ Practical/ Self-
Module Type Notional
Module Tutorials Industry study
Code C/E hours
visits
M01 Fundamentals of Information Security C 80 60 10 10
M02 Network and Communication Security C 110 70 30 10
Operating Systems and Application
M03 C 70 40 20 10
Security
Mobile and Internet of Things (IoT)
M04 C 60 30 20 10
Security
M05 Introduction to Ethical Hacking C 110 70 30 10
M06 Enterprise Security Architecture C 110 80 20 10
M07 Information Security Monitoring C 100 70 20 10
Information Security Standards,
M08 C 60 40 10 10
Policies, Procedures
EMPM01 Workplace Information Management C 50 30 15 05
Total 750 500 175 75
Semester 2
Lectures/ Practical/ Self-
Module Notional
Module Type Tutorials Industry study
Code hours
visits
Vulnerability Assessment and
M09 C 100 50 30 20
Remediation
M10 Fundamentals of Database Security C 90 50 20 20
M11 Introduction to Cryptography C 90 50 20 20
Incident Response and Security
M12 C 100 50 40 10
Operations Center
M13 Fundamentals of Digital Forensics C 100 50 40 10
Introduction to Governance Risk and
M14 C 70 40 10 20
Compliance
Information Security Laws, Regulations
M15 C 70 40 10 20
and Ethics
Business Continuity and Disaster
M16 C 70 40 10 20
Recovery
Workplace Communication
EMPM02 C 50 30 15 05
Management
Planning and Scheduling Work at
EMPM03 C 75 45 20 10
Workplace
Total 815 445 215 155
C – Compulsory
7
MAPPING OF COMPETENCY UNITS AND CURRICULUM MODULES
NVQ Level 5 Qualification
Semester 1
Semester 2
Vulnerability Assessment and K72T002U06, K72T002U07, EMPU01
M09
Remediation
Fundamentals of Database K72T002U01, K72T002U02, K72T002U03, K72T002U04
M10
Security
M11 Introduction to Cryptography K72T002U01, K72T002U02, K72T002U03, K72T002U04
K72T002U01, K72T002U07, EMPU01, EMPU02,
Incident Response and
M12
Security Operations Center EMPU03
K72T002U01, K72T002U07, EMPU01, EMPU02,
Fundamentals of Digital
M13
Forensics EMPU03
8
K72T002U01, K72T002U02, K72T002U03, K72T002U04,
Introduction to Governance
M14 K72T002U05, K72T002U06, K72T002U07, EMPU01,
Risk and Compliance
EMPU02, EMPU03
K72T002U01, K72T002U02, K72T002U03, K72T002U04,
Information Security Laws,
M15 K72T002U05, K72T002U06, K72T002U07, EMPU01,
Regulations and Ethics
EMPU02, EMPU03
K72T002U01, K72T002U02, K72T002U03, K72T002U04,
Business Continuity and
M16 K72T002U05, K72T002U06, K72T002U07, EMPU01,
Disaster Recovery
EMPU02, EMPU03
EMPM02 Workplace Communication EMPU02
Management
EMPM03 Planning and Scheduling EMPU03
work at workplace
9
MODULE DESCRIPTORS
NVQ Level 05
Semester I
10
Module Title Fundamentals of Information Security
Module Code K72T002M01
Module Type Compulsory
Relevant Unit/s All
Pre-Requisites NVQ 4 or GCE (A/L) with GIT
Network Security
o Gateway level security etc.
Operating system and application security
Malware
o Types of malware
Virus
11
Trojan
Worm
Ransomware
APT (Advance persistent Threats) etc.
o Malware classification (based on payload, target and propagation)
o Countermeasures
o Antivirus, EDR
User identity, authentication, authorization and accountability
o Identity and Access Management (IAM)
o Privilege access management
Availability and disaster recovery
Cyber security laws and regulations-introduction
Digital Forensics
Impact of IS breaches for a business
o Impact to the goodwill or brand image
o Failure to serve the client/operational disruption
Introduction to cloud and cloud security
Terminology of information security
Illustrated talk
Teaching/
Group activities
Learning Discussions
Activities Guest lectures from private and state organizations
Demonstrations
assignments
12
Topic / Activity/Learning
Type Module Weighting
Assessment & outcomes
Weighting Formative Assignments – above 40%
Assessment assignment, presentation and
viva test
Summative 60%
Question paper based on class
(semester end)
room teaching
Assessment
80 hrs. (60T + 10P + 10S)
Duration
(T-Theory , P-Practical , S- Self Studies)
13
Module Title Network and Communication Security
Module Code K72T002M02
Module Type Compulsory
Relevant Unit/s All
Learning At the end of this module the student shall be able to:
Outcome/s Describe OSI reference Layers and security of individual layer
Explain how network-based attacks are taking place.
Explain available network security measures
Network and Communication Security
Network Security basics
o Network and network components (components, 7 layers)
o Importance of network protocols in IS-TCP/IP
o Understanding different types of network threats
o Physical security for networks
o Physical and logical partitioning using firewalls
Network Security Technologies
o Fire-walling - firewalls, UTM
o Denial of Service Prevention
o Network Intrusion detection and prevention
o Web, email security, proxy
Learning Content o VPN
o Remote Access
/ Topics
o NAC
Secure protocols for communication
o Encryption
o HTTPS/SSL/TSL/SSH
Wireless Security
User Authentication and Access management to network devices
o Protocols and technologies
o Securing access to device and systems
Best practices for network Security
Introduction to secure networks
o Network architecture
Introduction to IOT communication in relation to IS
14
- Group Activity – Configure a firewall to control traffic (Trainer to setup the
lab so that the student can implement multiple rules on a firewall and test
Practical communication – web, mail, ftp, etc.,)
- Assignment: study and provide a report on most commonly used network
protection technologies and how they work
Networked computers
Resources Internet facility
Firewall, switches and routers
Tools(wire shark)
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
Prescribed Texts House
& / or 3. Principles of Information Security - 5th Edition, by Whitman, Michael
Mattord, Herbert
References
4. Foundations of Information Security A Straightforward Introduction, by
Jason Andress
5. Network Security For Dummies, 1st Edition, Author Chey Cobb :
Illustrated talk
Teaching/
Group activities
Learning Discussions
Activities Guest lectures from private and state organizations
Demonstrations
assignment
Topic / Activity/Learning
Type Module Weighting
Assessment & outcomes
Weighting Formative Assignments – above 40%
Assessment assignment, presentation and
viva test
Summative 60%
Question paper based on class
(semester end)
room teaching
Assessment
110 hrs. (70T +30P + 10S)
Duration
(T-Theory , P-Practical , S- Self Studies)
15
Module Title Operating Systems and Application Security
Module Code K72T002M03
Module Type Compulsory
Relevant Unit/s All
NVQ 4 ICT or equivalent qualifications and K72T002M1
Pre-Requisites *Intermediate course
16
Introduction to Application Security Concepts
Architecture and deployment
Principle of Least Privilege - access only to manage the work
Principle of Separation of Duties - based on the job function - restricted
access to complete the full operation
Principle of Defense in Depth - access only to the application - no privilege to
access settings
Principle of Failing Securely - designed with potential failures in mind
Principle of Open Design - option of integrating various open security
standards available and the possibility to upgrade with time
Principle of Avoiding Security by Obscurity
Principle of Minimizing Attack Surface Area
Continuous assessment on application vulnerabilities
Illustrated talk
Teaching/
Group activities
Learning Discussions
Activities Guest lectures from private and state organizations
Demonstrations
assignment
17
Type Topic / Activity/Learning Module Weighting
outcomes
Assessment &
Formative Assignments – above 40%
Weighting Assessment assignment, presentation and
viva test
60%
Summative
Question paper based on class
(semester end)
room teaching
Assessment
70 hrs. (40T + 20P + 10S)
Duration
(T-Theory , P-Practical , S- Self Studies)
18
Module Title Mobile and Internet of Things (IoT) Security
Module Code K72T002M04
Module Type Compulsory
Relevant Unit/s All
NVQ 4 ICT or equivalent qualifications and K72T002M1
Pre-Requisites *Intermediate course
Learning At the end of this module the student shall be able to:
Outcome/s Explain mobile/IoT operating systems and security challenges
Explain common mobile and IoT security measures
Types of Mobile Devices
o Portable Computers
o Tablets
o Smartphones
o Wearable Technology
o Legacy Devices
o Mobile Device Removable Storage
o Introduction to IOS, ANDROID and other mobile OS and their key
differences (can be a group exercise)
Mobile Device Risks
o Limited Physical Security
o Connecting to Public Networks
o Location Tracking
Learning Content
o Installing Unsecured Applications
/ Topics o Accessing Untrusted Content
o Bring Your Own Device (BYOD) Risks
Securing Mobile Devices
o Device Setup
o Device and App Management
o Device Loss or Theft
Mobile Device App Security
o BYOD Security
o Implementing mobile device management
Introduction to IoT devices
o Types of devices and deployment of architecture
Security challenges and IoT
o Limitations to implement security in IoT devices
Overcome IoT security challenges
19
o Authentication and Encryption
Demonstrations- A mobile breach can be demonstrated by the trainer
Practical
Assignment 01: Common attacks targeting mobile devices
Assignment 02: Common security issues in IoT devices (Self Study)
Networked and isolated devices (computer)
Resources Internet facility
Mobile devices
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
Prescribed Texts
House
& / or 3. Principles of Information Security - 5th Edition, by Whitman, Michael
References Mattord, Herbert
4. Foundations of Information Security A Straightforward Introduction, by
Jason Andress
Illustrated talk
Teaching/ Group activities
Discussions
Learning
Guest lectures from private and state organizations
Activities Demonstrations
assignment
Topic / Activity/Learning
Type Module Weighting
Assessment & outcomes
Weighting Formative Assignments – above 40%
Assessment assignment, presentation and
viva test
Summative 60%
Question paper based on class
(semester end)
room teaching
Assessment
60 hrs. (30T + 20P + 10S)
Duration
(T-Theory , P-Practical , S- Self Studies)
20
Module Title Introduction to Ethical Hacking
21
o SQL Injection tools
Introduction to attacking tools related to mobile platforms
Introduction to attacking tools related to IoT
Networked computers
Internet facility
Multiple tools used for attacks
o NMAP. Nmap stands for Network Mapper
o Exploitation tools (E.g. Metasploit (rapid 7)),
o Scanning Tools (Nessus, Angry IP Scanner, SuperScan)
o Burp Suit. Burp Suite is a popular platform that is widely used for
Resources performing security testing of web applications
o Cain & Abel
o Ettercap
o EtherPeek
o SQL map
o Kali Linux
Illustrated talk
Teaching/
Group activities
Learning Discussions
Activities Guest lectures from private and state organizations
Demonstrations
assignment
22
Type Topic / Activity/Learning Module Weighting
outcomes
Assessment &
Formative Assignments – above 40%
Weighting Assessment assignment, presentation and
viva test
60%
Summative
Question paper based on class
(semester end)
room teaching
Assessment
110 hrs. (70T +30 P +10S)
Duration
(T-Theory , P-Practical , S- Self Studies)
23
Module Title Introduction to Enterprise Security Architecture
Module Code 14 Jan
K72T002M06
Module Type 17 Dec & 7 Jan
Compulsory
Relevant Unit/s All units
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
24
o Operating system security
o File security
o Database security, practices and procedures
o Application security
o High availability and growth scalability
25
Networked computers
Internet facility
Resources Open source tools and software
Relevant acts
Relevant standards
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by
Nathan House
Prescribed Texts & / 3. Principles of Information Security - 5th Edition, by Whitman, Michael
Mattord, Herbert
or References
4. Foundations of Information Security A Straightforward
Introduction, by Jason Andress
26
Module Title Security Monitoring and Administration
Module Code K72T002M07
Module Type Compulsory
Relevant Unit/s K72T002U01, K72T002U02, K72T002U05
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
Introduction to monitoring
Fundamentals of Monitoring
o Aspects of monitoring-
System health monitoring
Logs monitoring
Network flows
Network packet monitoring (tapping, mirroring etc.)
o Identifying primary monitoring points
Learning Content o Privilege access monitoring
application access and OS access
/ Topics Network access
Database access
o Continuous Monitoring (detecting anomalies)
o Introduction to threat hunting
o Compliance monitoring
o Identification of False positive and false negative
o Centralized logging and monitoring
Introduction to monitoring tools (Nagios, Wireshark, SIEM etc.)
Technologies used
o SNMP
o NetFlow
27
o QFlow
Change request management and monitoring
Identification and classification of incidents
Networked computers
Resources Internet facility
Open source tools and software
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
Prescribed Texts House
& / or 3. Principles of Information Security - 5th Edition, by Whitman, Michael
Mattord, Herbert
References
4. Foundations of Information Security A Straightforward
Introduction, by Jason Andress
5. CEH Certified Ethical Hacker All-in-One Exam Guide, Author Matthew
Walker
Illustrated talk
Teaching/ Group activities
Learning Discussions
Demonstrations
Activities
Given practical
assignment
28
Module Title Information Security Standards, Policies and Procedures
Module Code K72T002M08
Module Type Compulsory
Relevant Unit/s All
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
29
security and risks systematically and across entire enterprise
information security.)
o (The framework for ISMS is usually focused on risk
assessment and risk management)
Introduction to ISO 27001
(Note: with a specific focus on Data Center Security: Standards, Best
Practices & Requirements)
Expected out comes of security standard implementation
Implementation of a standard - certification
Keeping the certification live
o Continuous improvements
Group Assignment:
Practical/assignment o Group Presentation on the controls of ISO 27001, NIST, PCIDSS, ITIL
Networked computers
Resources Internet facility
Open source tools and software
ISO Guidelines and other reference frameworks and standards
1. Computer and Information Security Handbook - 3rd Edition by John R.
Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by
Nathan House
Prescribed Texts & / or 3. Principles of Information Security - 5th Edition, by Whitman, Michael
References Mattord, Herbert
4. Foundations of Information Security A Straightforward Introduction, by
Jason Andress
5. ISO Guidelines and other reference frameworks and standards
Illustrated talk
Teaching/ Learning Group activities
Discussions
Activities
Demonstrations
Given practical
assignment
30
Module Title Workplace Information Management
Module Code EMPM01
Module Type Compulsory
Relevant Unit/s EMPU01
Pre-Requisites None
To enable the students to:
Module Aims Make use of information and information systems to carry out
organizational functions
Make use of information and information systems to enhance
workplace performance
31
and biases
Conducting and recording of performance evaluations
Teaching Aids
Resources
Networked Computers, Multimedia, Whiteboard
Information Management: Best Practices – Volume 1
Recommended Texts &
/ or References (Bob Boiko, Erik M. Hartman )
32
Choice Test Items/ Matching
and Completion test items and
structured essay type questions
knowledge on application of
information management skills- 10%
Viva voce
Duration 50 hours (30T + 15P + 05S)
(T-Theory, P-Practical, S- Self Studies)
33
MODULE DESCRIPTORS
NVQ Level 05
Semester 2
34
Module Title Vulnerability Assessment & Remediation
Module Code K72T002M09
Module Type Compulsory
Relevant Unit/s K72T002U06, K72T002U07, K72T002U08
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
To enable the students to:
determine whether infrastructure components, systems and applications
Module Aim/s meet confidentiality, integrity, authentication, availability, authorization and
non-repudiation standards
report the testing outcomes by compiling the Vulnerability Assessment
report using templates
At the end of this module the student shall be able to:
Learning
explain what are vulnerability assessment (VA) and penetration testing
Outcome/s
identify VA framework
categorize, analyze and carry-out vulnerability testing
remediate vulnerabilities
Introduction to vulnerability assessment (VA) and penetration testing
o Requirement for VA
Compliance purposes
Mitigating cyber risks
Regulatory requirements
o Areas of vulnerability assessments (network vulnerability
assessments, system/host based vulnerability assessments,
application VA etc.)
o source code review
o Penetration testing
Vulnerability Assessment framework
Learning Content Preparation for VA
/ Topics o Agreement/NDAs
o Information gathering (organization policies, network diagrams etc.)
o Stakeholder communication
Categories of vulnerability testing
o Black box, white box and gray box
o Internal and external VA
o In-house and out sourced VA
o Intrusive and non-intrusive
Vulnerability testing
o Vulnerability identification
o Vulnerability analysis
Vulnerability classification (high, critical, medium)
35
Common classification frameworks (CVE, CVSS)
Validation of false positives and false negatives
o Vulnerability reporting
Templates for reporting
Validation with system owners
Types of tools used for VA
o Scanning tools (Nessus, Nmap, Wireshark, metasploit, John the
Ripper, sqlmap, Aircrack-ng, Burp suite and OWASP ZAP web
application security scanners, Kali Linux, Etc.
o Web application testing guidelines - Open Web Application Security
Project (OWASP)
Vulnerability remediation
o Prioritization of vulnerability remediation action
o Methods of remediation (Security patches, compensating controls
etc.)
o Review of remediation
Practical:
Perform vulnerability assessment for a given system by using provided
VA tools
(Instructor come up with few number of hosts which contain known
vulnerabilities. each student to use provided VA tools and identify the
vulnerabilities of the hosts.)
Practical Instructor to enable the monitoring of the target host using tools like
Wireshark/TCP Dump –student get the visibility how ports scanning
happens
Networked computers
Resources Internet facility
Open source /commercial tools and software
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
Prescribed Texts 2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
& / or House
3. Principles of Information Security - 5th Edition, by Whitman, Michael
References Mattord, Herbert
4. Foundations of Information Security A Straightforward
Introduction, by Jason Andress
Teaching/
Illustrated talk
36
Learning Group activities
Activities Discussions
Given practical
assignment
37
Module Title Fundamentals of Database Security
Module Code 14 Jan
K72T002M10
Module Type 17 Dec & 7 Jan
Compulsory
Relevant Unit/s K72T002U01, K72T002U02, K72T002U03, K72T002U04
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
38
o Monitoring health of the database and the host
o Database activity monitoring
o Change request management and access monitoring
o Continuous assessments of vulnerabilities
Database standards and benchmarks
o implementing standards and benchmarks based on industry and
vendor specifications
39
Module Title Introduction to Cryptography
Module Code K72T002M11
Module Type Compulsory
Relevant Unit/s K72T002U01, K72T002U02, K72T002U03, K72T002U04
Pre-Requisites NVQ 4 ICT or equivalent qualifications
History of cryptography
Introduction to Cryptography: Network security model, Cryptographic
systems, Cryptanalysis,
Steganography - Information hiding
Foundational concepts of cryptography
Importance of cryptography
o Message confidentiality
Message integrity
Message non-repudiation
Common algorithms
o Old ciphers
o New ciphers
Learning Content Symmetric key cryptography
/ Topics Asymmetric key cryptography (public key)
Encryption and Decryption Techniques
PKI (Public Key Infrastructure)
Crypto hashing functions
Use of cryptography
o Encryption
HTTPS
SSL
Email encryption etc.
o Digital signature
Document signing
E-mail signing(PGP)
o Digital certificate and certificate authority
o Electronic money (crypto currency)
40
Practical Examples: using of; The Caesar cipher
Mono-alphabetic cipher
Poly-alphabetic cipher
Vigenère cipher
(Instructor to design the above practical as a game/team activity)
Practical on Steganography –
Encoding an image with a secret text
Practical on use of cryptography
Practical
o Generating a CSR (Certificate Signing Request) and get a signed
certificate from a local CA (Certificate Authority). Then the student can
use the signed certificate to send a signed/encrypted email to another
student
o Signing a document (word or pdf)
Assignment: Individual assignment –report on history of cryptography
Group assignment and presentation - Real life usage of
cryptography
Networked computers
Certificate server (Microsoft or open source)
Resources
Open source tools to demonstrate above activities
Internet facility
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
House
3. Principles of Information Security - 5th Edition, by Whitman, Michael
Mattord, Herbert
Prescribed Texts 4. Foundations of Information Security A Straightforward
& / or Introduction, by Jason Andress
Illustrated talk
Teaching/
Group activities
Learning Discussions
Activities Demonstrations
Given practical
assignment
41
Assessment & outcomes
Weighting
Formative above practical and assignment, 40%
Assessment their course works,
presentations and viva test
Summative 60%
Question paper based on class
(semester end)
room teaching
Assessment
90hrs. (50T + 20P + 20S)
Duration
(T-Theory , P-Practical , S- Self Studies)
42
Module Title Incident Response and Security Operations Center
Module Code K72T002M12
Module Type Compulsory
Relevant Unit/s K72T002U01, K72T002U06, K72T002U07, K72T002U08, K72T002U09
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
To enable the students to:
identify, troubleshoot and escalate of security incidents by detection and
Module Aim/s analysis of security events based on the complexity
communicate with management, external parties and technology owners to
escalate security incidents
43
Post incident activities
-Complete an Incident Report based on templates
-Monitor Post-Incident
-Update Threat Intelligence
-Identify preventative measures
Practical
Develop multiple scenarios on a test setup where the activities to be
monitored using a SIEM tool (OSIM/ELK). While the supervisor executes the
scenario, the student can monitor the activity/incident in the SIEM. Student
to come up with an incident report as the result
Practical
Assignment: (Individual)
Students are requested to identify, document and present how an
incident response take place for the given scenarios (Example scenarios:
Privilege escalation attempt, website port scan)
Networked computers
Resources Internet facility
Open source /commercial tools and software
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
House
3. Principles of Information Security - 5th Edition, by Whitman, Michael
Prescribed Texts Mattord, Herbert
4. Foundations of Information Security A Straightforward
& / or
Introduction, by Jason Andress
References
5. Security Operations Center Guidebook. A Practical Guide for a Successful
SOC by Gregory Jarpey and R. Scott McCoy
6. NIST guidelines
7. SANS guidelines
Illustrated talk
Teaching/ Group activities
Learning Discussions
Demonstrations
Activities
Given practical
assignment
44
Weighting
End semester Question paper based on class 60%
Assessment room teaching
100hrs. (50T + 40P + 10S)
Duration
(T-Theory , P-Practical , S- Self Studies)
45
Module Title Fundamentals of Digital Forensics
Module Code 14 Jan
K72T002M13
Module Type 17 Dec & 7 Jan
Compulsory
Relevant Unit/s All units
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
46
Acquiring and preserving digital and electronic evidences
o Hardware/software write blocker
o Open source tools – E.g. Autopsy
o Wireshark
o TCPdump/Windump/WinPcap
o DumpIT
o Disk Imaging and disk cloning tools
o Microsoft sys internal tools
o WhoIs, Finger, Ping, Trace, NS look up, Dig
o Procedure of first responder
Identifying digital and electronic evidences
Acquiring, Preserving and transporting digital and electronic
evidences
Forensic tools for first responder
Data Recovery:
o Recover deleted files
o Recover data from physically damaged media
Anti-forensic techniques e.g. data overwriting, data hiding and distortion,
encryption
Timeline analysis
Procedural Documentation
o Discovery method
o Personnel involved
o Exact sequence of events/ Attack timeline
o System events
o Documentation of actions and timeline
o Preventative measures resulting from the investigation
o Recovery steps taken and further recommendations
47
Internet facility
Open-source tools and software
Documentation of Relevant acts and standards
Teaching/
Illustrated talk
Learning Group activities
Activities Discussions
Given practical
assignment
48
Module Title Introduction to Governance Risk and Compliance
Module Code K72T002M14
Module Type Compulsory
Relevant Unit/s All units
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
49
Risk registers
Risk profile, risk indicators
Risk management standards and framework (E.g. ISO 31000, ISO 27005, NIST
Special Publications)
IT governance standards e.g. COBIT
Commonly practiced standards in terms of compliance
Practical:
Assignment:1
Identify risk treatment plans for given scenarios (individual assignment)
Networked computers
Resources Internet facility
Open-source tools and software
Documentation of relevant frameworks and standards
50
Illustrated talk
Teaching/ Group activities
Learning Discussions
Field trips
Activities
Given practical
assignment
51
Module Title Introduction to Information Security Laws, Regulations and Ethics
52
o Code of professional ethics
o (ISC )2 for reference
Assignment 1:
Presentation on information security ethics
Practical Role play on information security ethics
Individual assignment:
Analyze national and international legal landscape for a given case study
Networked computers
Resources Internet facility
Relevant acts and bills
Relevant standards
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
House
3. Principles of Information Security - 5th Edition, by Whitman, Michael
Mattord, Herbert
Prescribed Texts 4. Foundations of Information Security A Straightforward
Introduction, by Jason Andress
& / or
5. Cybercrime investigations bridging the gaps between security professionals,
References
law enforcement, and prosecutors by Anthony Reyes, Richard Brittson, Kevin
OShea, James Steele
http://icta.lk/act
http://documents.gov.lk/en/acts.php
53
Weighting 60%
Common Question paper on
End semester class room teaching (MCTIs and
Assessment structured short answered test
items)
54
Module Title Introduction to Business Continuity Planning and Disaster Recovery
Module Code K72T002M16
Module Type Compulsory
Relevant Unit/s All units
Pre-Requisites NVQ 4 ICT or equivalent qualifications and K72T002M01
Practical
55
Assignment:1:
Types of disasters and effects on ICT systems
Assignment:2:
Study and present high availability solutions applicable for disaster recovery
and business continuity
Networked computers
Internet facility
Resources Open-source tools and software
Regulatory guidelines and policies
Relevant standards
1. Computer and Information Security Handbook - 3rd Edition
by John R. Vacca
2. The Complete Cyber Security Course, Volume 1 Hackers Exposed, by Nathan
House
3. Principles of Information Security - 5th Edition, by Whitman, Michael
Prescribed Texts
Mattord, Herbert
& / or 4. Foundations of Information Security A Straightforward
Introduction, by Jason Andress
References
5.Business Continuity For Dummies
by Released December 2012
Publisher(s): For Dummies
ISBN: 9781118326831
Illustrated talk
Teaching/ Group activities
Learning Discussions
Given practical
Activities
Field trips
assignment
56
Employability Modules
Semester 2
57
Module Code EMPM02
Module Type Compulsory
Relevant Unit/s EMPU02
Pre-Requisites None
To enable the students to:
Module Aims Apply communication skills to maintain effective workplace performance
of communication skills
At The student will be able to:
Identify the essential components of an efficient communication system
Identify and overcome barriers to effective communication
Use all channels of communication equally well
Use common computer applications to collect, analyze and maintain
Learning Outcomes
essential data and information required to perform and enhance day to
day activities of the organization
Contributes to the overall growth and productivity development of the
organization
58
Teaching Aids
59
place- Multiple Choice Test Items/
Assessment &
Matching and Completion test
Weighting
items and structured essay type
questions
knowledge on application of 10%
communication skills- Viva voce
Duration 50 hours (30T + 15P + 05S)
(T-Theory, P-Practical, S- Self Studies)
60
Module Title Planning and Scheduling Work at Workplace
Pre-Requisites None
Module Aims To enable the students to:
Learning Outcomes At the end of this module the student shall be able to:
Prepare a work schedule for a given work situation
Determine work priorities as per predetermined criteria such as goals,
targets and organizational requirements
Develop a plan (process) to complete work to be done in a given
situation
Assess competencies of individual workers before assigning work
61
Forecasting Techniques /methods
Time management techniques
Competency assessment methods
Teaching Learning Small group activity -1 - Identify work requirements of a drawing office
Activities
or of a given project
Small group activity -2 - Set work priorities as per organizational
requirements goals and targets
Small group activity -3 -Develop a plan (process) to complete work to
be done at drawing office or in a given project
Individual activity - Prepare list/s of tools, equipment, material
required to complete the work as indicated in the plan developed in
activity -3
Small group activity -4 Brainstorm in groups to identify,
Deficiencies in the plan (Developed in activity -3)
Modifications to be made to overcome deficiencies
Explain and follow up with exercises
Forecasting methods / Techniques, Time management techniques,
Competency assessment method
62
class room presentations
Knowledge of various aspects of 30%
planning of work to be performed at
workplace - Multiple Choice Test
Items/ Matching and Completion
test items and structured essay type
Summative
questions
assessment
knowledge on application of 10%
planning of work in a given work
situation - Viva voce
63