Course Syllabus
Course Syllabus
awareness about cyber security challenges and the concepts of cyber security and cyber ethics among
the students to help them become responsible cyber citizens and participate safely and securely in the
rapidly evolving information-age society Course Outcome: By the end of this course, students should be
able to: 1. Remember the broad set of technical, social & political aspects of Cyber Security. 2.
Understand the importance of ethical hacking, its tool and ethical hacking process. 3. Analyse security
principles to system design. 4. Understand the methods for authentication, access control, intrusion
detection and prevention in Cyber Security Course Content: Unit 1 Fundamentals of Cyber Security and
Threat Landscape Importance and challenges in Cyber Security, Cyberspace, and Cyber threats, Cyber
warfare, CIA Triad, Cyber Terrorism, Cyber Security of Critical Infrastructure Unit 2 Cyber Attacks and
Intrusion Techniques Types of Hackers - Hackers and Crackers, Cyber-Attacks and Vulnerabilities,
Malware threats, Sniffing, Gaining Access - Escalating Privileges, Executing Applications, Hiding Files,
Covering Tracks. Worms, Trojans, Viruses, Backdoors Unit 3 Ethical Hacking and Information Security
Practices Ethical Hacking Concepts and Scopes, Threats and Attack Vectors, Information Assurance,
Threat Modeling, Enterprise Information Security Architecture, Vulnerability Assessment and
Penetration Testing Unit 4 Social Engineering and Insider Threats Types of Social Engineering - Insider
Attack - Preventing Insider Threats - Social engineering Targets and Defence Strategies Unit 5 Legal
Framework and Countermeasures in Cyber Security IT Act, Hackers-Attacker-Countermeasures, Web
Application Security, Counter Cyber Security Initiatives in India, Cyber Security Incident Handling, Cyber
Security Assurance Recommended Books: 1. Cyber Security and Cyber Laws Nilakshi Jain Wiley 2. Cyber
Security Nina Godbole Wiley
MODULE 1: UNDERSTANDING THE THREAT FROM CYBER CRIME (9L) Introduction Cyber Threat –
Definition of Cyber Crime – Classification – Current Threats and Trends – Diversity of Cyber Crime –
Cyber Hate Crimes – Cyber Terrorism. MODULE 2: RESPONDING TO CYBER CRIME (9L) Cyber Strategy –
National Security Strategy – Cyber Security Strategy – Organized Crime Strategy – Cyber Crime Strategy ‐
Policy Cyber Crime – International Response – National Cyber Security Structure – Strategic Policy
Requirements – Police and Crime Commissioners. MODULE 3: INVESTIGATING CYBER CRIME (9L)
Preventing Cyber Crime – Password Protection – Get Safe Online – Cyber Security Guidance for Business
‐ Cyber Crime Investigation Skills – Criminal Investigation – Code of Ethics – Evidence – Hi‐Tech
Investigations – Capturing and Analyzing Digital Evidence. / MODULE 4: DIGITAL FORENSICS (9L)
Introduction to Digital Forensics ‐ Forensic Software and Hardware ‐ Analysis and Advanced Tools ‐
Forensic Technology and Practices ‐ Forensic Ballistics and Photography ‐ Face, Iris and Fingerprint
Recognition ‐ Audio Video Analysis ‐ Windows System Forensics ‐ Linux System Forensics ‐ Network
Forensics. MODULE 5: CASE STUDY (9L) Latest Study Topics on Cyber Crime and Investigations ‐ Recent
Cyber Crime Cases – Recent Digital Forensics Cases – Bridging the Gaps in Cyber Crime Investigations
between the cyber security stake holders. TEXT BOOKS 1 Thomas Halt, Adam M. Bossler and Kathryn
C.Seigfried Spellar, ―Cybercrime and Digital Forensics: An Introduction‖, Routledge Taylor and Francis
Group 2017. REFERENCE BOOKS 1 Bernadette H Schell, Clemens Martin, ―Cybercrime‖, ABC – CLIO Inc,
California, 2004 E BOOKS 1
https://books.google.co.in/books/about/Cybercrime_and_Digital_Forensics.html?id=7S
A6DwAAQBAJ&redir_esc=y