0% found this document useful (0 votes)
71 views2 pages

Lesson Plan Cyber Security

Cyber security syllabus – little lesson plan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views2 pages

Lesson Plan Cyber Security

Cyber security syllabus – little lesson plan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cyber security syllabus – little lesson plan

UNIT I: Introduction to Cybercrime (8 Hours)

1. Introduction to Cybercrime (1 Hour)


o Definition and origins of cybercrime.
o Importance of addressing cybercrime.
2. Cybercrime and Information Security (1 Hour)
o Relationship between cybercrime and information security.
o Importance of information security in preventing cybercrime.
3. Cyber Criminals and Classifications of Cybercrimes (2 Hours)
o Types of cybercriminals and their motivations.
o Classification of cybercrimes: personal, property, and government.
4. Legal Perspectives on Cybercrime (2 Hours)
o Cybercrime under the Indian IT Act 2000.
o Overview of global cybercrime laws and regulations.
5. Indian Perspective and Global Outlook on Cybercrime (2 Hours)
o Case studies from India and globally.
o Evaluation of the effectiveness of cyber laws.

UNIT II: Cybercrime - Mobile and Wireless Devices (12 Hours)

1. Introduction and Trends in Mobility (1 Hour)


o Proliferation of mobile and wireless devices.
o Trends in mobile technology and associated risks.
2. Credit Card Frauds in Mobile Era (1 Hour)
o Methods of credit card fraud in mobile computing.
o Case studies and prevention strategies.
3. Authentication and Security in Mobile Devices (2 Hours)
o Authentication mechanisms for mobile security.
o Types of attacks on mobile/cell phones and preventive measures.
4. Security Implications for Organizations (2 Hours)
o Mobile devices as security risks to organizations.
o Impacts of data breaches on businesses.
5. Organizational Measures and Security Policies (2 Hours)
o Best practices for handling mobile device security issues.
o Designing robust security policies in the mobile computing era.
6. Laptops and Security Concerns (1 Hour)
o Unique security challenges for laptops.
o Guidelines for securing organizational laptops.
7. Case Studies and Discussions (3 Hours)
o Real-life examples of mobile and wireless device attacks.
o Group discussions on preventive strategies.

UNIT III: Tools and Methods Used in Cybercrime (10 Hours)

1. Password Cracking and Keyloggers (2 Hours)


o Techniques for password cracking and their implications.
o Keylogger functionality and preventive measures.
2. Spyware, Viruses, and Worms (2 Hours)
o Definitions and differences between spyware, viruses, and worms.
o Tools for detection and prevention.
3. Trojan Horses and Backdoors (1 Hour)
o How Trojans and backdoors compromise system security.
o Case studies of significant Trojan attacks.
4. Steganography and Attacks on Wireless Networks (2 Hours)
o Basics of steganography and its role in cybercrime.
o Wireless network vulnerabilities and attack prevention.
5. Phishing and Identity Theft (3 Hours)
o Overview of phishing and execution techniques.
o Methods and strategies to prevent identity theft.
o Analysis of recent cases and preventive solutions.

Total Duration

 UNIT I: 8 Hours
 UNIT II: 12 Hours
 UNIT III: 10 Hours
Total: 30 Hours

You might also like