0% found this document useful (0 votes)
25 views

Course Syllabus

Syllabus

Uploaded by

Gunjan Bhatnagar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Course Syllabus

Syllabus

Uploaded by

Gunjan Bhatnagar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Course: Cyber Security Course Objective: This course is geared towards generating and enhancing

awareness about cyber security challenges and the concepts of cyber security and cyber ethics among
the students to help them become responsible cyber citizens and participate safely and securely in the
rapidly evolving information-age society Course Outcome: By the end of this course, students should be
able to: 1. Remember the broad set of technical, social & political aspects of Cyber Security. 2.
Understand the importance of ethical hacking, its tool and ethical hacking process. 3. Analyse security
principles to system design. 4. Understand the methods for authentication, access control, intrusion
detection and prevention in Cyber Security Course Content: Unit 1 Fundamentals of Cyber Security and
Threat Landscape Importance and challenges in Cyber Security, Cyberspace, and Cyber threats, Cyber
warfare, CIA Triad, Cyber Terrorism, Cyber Security of Critical Infrastructure Unit 2 Cyber Attacks and
Intrusion Techniques Types of Hackers - Hackers and Crackers, Cyber-Attacks and Vulnerabilities,
Malware threats, Sniffing, Gaining Access - Escalating Privileges, Executing Applications, Hiding Files,
Covering Tracks. Worms, Trojans, Viruses, Backdoors Unit 3 Ethical Hacking and Information Security
Practices Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance,
Threat Modeling, Enterprise Information Security Architecture, Vulnerability Assessment and
Penetration Testing Unit 4 Social Engineering and Insider Threats Types of Social Engineering - Insider
Attack - Preventing Insider Threats - Social engineering Targets and Defence Strategies Unit 5 Legal
Framework and Countermeasures in Cyber Security IT Act, Hackers-Attacker-Countermeasures, Web
Application Security, Counter Cyber Security Initiatives in India, Cyber Security Incident Handling, Cyber
Security Assurance Recommended Books: 1. Cyber Security and Cyber Laws Nilakshi Jain Wiley 2. Cyber
Security Nina Godbole Wiley

MODULE 1: UNDERSTANDING THE THREAT FROM CYBER CRIME (9L) Introduction Cyber Threat –
Definition of Cyber Crime – Classification – Current Threats and Trends – Diversity of Cyber Crime –
Cyber Hate Crimes – Cyber Terrorism. MODULE 2: RESPONDING TO CYBER CRIME (9L) Cyber Strategy –
National Security Strategy – Cyber Security Strategy – Organized Crime Strategy – Cyber Crime Strategy ‐
Policy Cyber Crime – International Response – National Cyber Security Structure – Strategic Policy
Requirements – Police and Crime Commissioners. MODULE 3: INVESTIGATING CYBER CRIME (9L)
Preventing Cyber Crime – Password Protection – Get Safe Online – Cyber Security Guidance for Business
‐ Cyber Crime Investigation Skills – Criminal Investigation – Code of Ethics – Evidence – Hi‐Tech
Investigations – Capturing and Analyzing Digital Evidence. / MODULE 4: DIGITAL FORENSICS (9L)
Introduction to Digital Forensics ‐ Forensic Software and Hardware ‐ Analysis and Advanced Tools ‐
Forensic Technology and Practices ‐ Forensic Ballistics and Photography ‐ Face, Iris and Fingerprint
Recognition ‐ Audio Video Analysis ‐ Windows System Forensics ‐ Linux System Forensics ‐ Network
Forensics. MODULE 5: CASE STUDY (9L) Latest Study Topics on Cyber Crime and Investigations ‐ Recent
Cyber Crime Cases – Recent Digital Forensics Cases – Bridging the Gaps in Cyber Crime Investigations
between the cyber security stake holders. TEXT BOOKS 1 Thomas Halt, Adam M. Bossler and Kathryn
C.Seigfried Spellar, ―Cybercrime and Digital Forensics: An Introduction‖, Routledge Taylor and Francis
Group 2017. REFERENCE BOOKS 1 Bernadette H Schell, Clemens Martin, ―Cybercrime‖, ABC – CLIO Inc,
California, 2004 E BOOKS 1
https://books.google.co.in/books/about/Cybercrime_and_Digital_Forensics.html?id=7S
A6DwAAQBAJ&redir_esc=y

MODULE 1: INTRODUCTION (9L) Principles of Network Security, Network Security Terminologies,


Network Security and Data Availability, Components of Network Security, Network Security Policies.
MODULE 2: SECURITY ON THE INTERNET AND WORLD WIDE WEB (9L) Components of Internet, Weak
points of Internet, Techniques of Web Hacking, Methods of Attacking users. MODULE 3: INTERNET
SECURITY PROTOCOLS AND STANDARDS (9L) Secure E-Mail and S/MIME, Domain Keys Identified Mail,
Secure Socket Layers and Transport Layer Security (TLS), HTTPS, IPV4 and IPV6 Security. MODULE 4:
INTERNET AUTHENTICATION APPLICATIONS (9L) Authentication requirement- Introduction, Kerberos,
X.509, Public-Key infrastructure MODULE 5: WIRELESS NETWORK SECURITY (9L) Wireless Security,
Mobile Device Security, IEEE802.11 Wireless LAN Overview, IEEE802.11i Wireless LAN Security TEXT
BOOKS 1 William Stallings, ―Principle of Computer Security‖, McGraw Hill Education, Fourth Edition,
2016. REFERENCE BOOKS 1 Atul Kahate, ―Cryptography and Network Security‖, Tata McGraw-Hill,
2003. E BOOKS 1 https://bookauthority.org/books/best-network-security-ebooks

You might also like