We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Cyber security syllabus – little lesson plan
UNIT I: Introduction to Cybercrime (8 Hours)
1. Introduction to Cybercrime (1 Hour)
o Definition and origins of cybercrime. o Importance of addressing cybercrime. 2. Cybercrime and Information Security (1 Hour) o Relationship between cybercrime and information security. o Importance of information security in preventing cybercrime. 3. Cyber Criminals and Classifications of Cybercrimes (2 Hours) o Types of cybercriminals and their motivations. o Classification of cybercrimes: personal, property, and government. 4. Legal Perspectives on Cybercrime (2 Hours) o Cybercrime under the Indian IT Act 2000. o Overview of global cybercrime laws and regulations. 5. Indian Perspective and Global Outlook on Cybercrime (2 Hours) o Case studies from India and globally. o Evaluation of the effectiveness of cyber laws.
UNIT II: Cybercrime - Mobile and Wireless Devices (12 Hours)
1. Introduction and Trends in Mobility (1 Hour)
o Proliferation of mobile and wireless devices. o Trends in mobile technology and associated risks. 2. Credit Card Frauds in Mobile Era (1 Hour) o Methods of credit card fraud in mobile computing. o Case studies and prevention strategies. 3. Authentication and Security in Mobile Devices (2 Hours) o Authentication mechanisms for mobile security. o Types of attacks on mobile/cell phones and preventive measures. 4. Security Implications for Organizations (2 Hours) o Mobile devices as security risks to organizations. o Impacts of data breaches on businesses. 5. Organizational Measures and Security Policies (2 Hours) o Best practices for handling mobile device security issues. o Designing robust security policies in the mobile computing era. 6. Laptops and Security Concerns (1 Hour) o Unique security challenges for laptops. o Guidelines for securing organizational laptops. 7. Case Studies and Discussions (3 Hours) o Real-life examples of mobile and wireless device attacks. o Group discussions on preventive strategies.
UNIT III: Tools and Methods Used in Cybercrime (10 Hours)
1. Password Cracking and Keyloggers (2 Hours)
o Techniques for password cracking and their implications. o Keylogger functionality and preventive measures. 2. Spyware, Viruses, and Worms (2 Hours) o Definitions and differences between spyware, viruses, and worms. o Tools for detection and prevention. 3. Trojan Horses and Backdoors (1 Hour) o How Trojans and backdoors compromise system security. o Case studies of significant Trojan attacks. 4. Steganography and Attacks on Wireless Networks (2 Hours) o Basics of steganography and its role in cybercrime. o Wireless network vulnerabilities and attack prevention. 5. Phishing and Identity Theft (3 Hours) o Overview of phishing and execution techniques. o Methods and strategies to prevent identity theft. o Analysis of recent cases and preventive solutions.
Total Duration
UNIT I: 8 Hours UNIT II: 12 Hours UNIT III: 10 Hours Total: 30 Hours