0% found this document useful (1 vote)
2K views2 pages

Cyber Commando Entranc Test Syllabus New

Cyber Commando Entranc Test Syllabus New

Uploaded by

VINEETH G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
2K views2 pages

Cyber Commando Entranc Test Syllabus New

Cyber Commando Entranc Test Syllabus New

Uploaded by

VINEETH G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cyber Commando Training Program

Screening Test
Syllabus

Unit: 1
Introduction to Binary, Octal, Decimal and Hexadecimal Number
Systems; Conversion from Binary to Decimal, Decimal to Binary, Binary
to Hexadecimal, Hexadecimal to Binary; Representation of signed and
unsigned Binary Numbers; ASCII and UTF. Definition of Computer, History
of Computer Evolution, Key Terms, Computer Architecture, Hardware and
Software, Programming Languages, Compiler and Interpreter.

Unit: 2
Introduction to Computer Hardware - Various Components of a
Computer, Motherboard, Processor, Memory, Storage Devices Hardware
and Software, Primary and Secondary Storage Devices; and Networking
components. Understanding Computer Operating Systems (OS), Booting
process of computers., Types of Operating System- Windows and Linux
OS architectures, Introduction to Filesystems

Unit: 3
Definition of Computer Network, Digital and Analog Signaling
Methods, Components of Network, Topology and Types of Networks –
LAN, MAN and WAN. Routers and Routing Protocols, Introduction to OSI
layer and TCP / IP protocol suite, Communication Devices, Different types
of IP Addresses and Classes, Subnet Masks, MAC Addresses,
Understanding Internet, Introduction to websites and webpages;
understanding Firewall, IDS and IPS; Introduction to Network and Internet
Related Crimes.

Unit: 4
Introduction to Mobile Technologies – Components of cellular
Network (CDMA /GSM), Introduction to Different Mobile Device, Hardware
Characteristic of Mobile Device, Software Characteristic of Mobile Device,
Mobile Operating System, Component of Mobile Phones, International
Mobile Equipment Identity (IMEI), Subscriber Identity Module (SIM), SIM
Files, Introduction to Smart Phones.

1
Unit: 5
Introduction to social media, Security Issues in social media, Types
of crimes of social media – Cyberbullying, Online Grooming,
Cyberstalking. Social media and its impact on Business, Politics, and
Revolutions, Emerging Trends in social media. Introduction to Computer
related Crimes, Form and Characteristics of Cyber Crime, Internal and
External Attacks, Crimes related to social media, and FinTech.
Investigation of Cyber Crime, Challenges in the Investigation of Cyber
Crime, Do’s and Don’ts while investigation of cyber crime.

Unit: 6
General knowledge, General Intelligence & Reasoning, General
Awareness, Quantitative Aptitude, English Language & comprehension,
Quantitative Aptitude, English Language & Comprehension, Statistics.

References and Suggested Readings:


1. Operating Systems | Internals and Design Principles, Ninth Edition by
William Stallings
2. John P. Hayes; “Computer Architecture and Organization”, McGraw-Hill,
1988.
3. V. Rajaraman and Niharika Adabala; “Fundamentals of Computers”, 6th
Edition, PHI Learning Pvt. Ltd., 2015.
4. Anita Goel; “Computer Fundamentals”, Pearson Publications, 2010.
5. Beherouz. A Forouzan; “Data Communication and Networking”, 4th
Edition, TMH, 2000.
6. Andrew S.Tanenbaum; “Modern Operating Systems”, 2nd edition,
Addison Wesley, 2001.
7. Gary Nutt; “Operating Systems: A Modern Perspective”, 2nd edition,
Pearson Education, 2001.
8. William Stallings; “Operating Systems: Internals and Design Principles”,
5th Edition, Prentice Hall, 2005.
9. Learn Computer Forensics: A beginner’s guide to searching, analyzing,
and securing digital evidence 1st Edition by William Oettinger.
10. Practical Guide to Computer Forensics Investigations, A (Pearson
IT Cybersecurity Curriculum (ITCC)) 1st Edition by Darren R. Hayes.
11. Nina Godbole and Sunit Belapore; “Cyber Security:
Understanding Cyber Crimes, Computer Forensics and Legal
Perspectives”, Wiley Publications,2011.

You might also like