Syllabus of Cyber Shikshaa
Syllabus of Cyber Shikshaa
Syllabus of Cyber Shikshaa
Module 3: Cryptography
● Introduction to cryptography
○ Introduction to Cryptography
○ Basic Encryption Concepts
○ File Encryption
○ Encryption folders(Graphical/ using cipher)
○ Data recovery agent
● Hash functions
○ MD5-message digest algorithm
○ SHA-1 Secure Hash algorithm
○ HMAC
○ Secure Email Implementation
○ gpg
○ Compression
○ Algorithm for gpg
○ S/MIME
● Applications of cryptography- IPsec
○ Attacks against encryption
○ Cryptographic issues
○ Strong authentication
○ Sign on solutions
○ Kerberos
○ Policies
○ SSL
○ TLS
○ Public Key Infrastructure Setup using openca
○ PKI Standards and Management
○ X.500
○ X.509
○ ETF
○ IRTF
○ Secure Key Generation and distribution
○ PKI Fundamentals
○ CA
○ Enrollment
○ Revocation
○ Certificate templates
○ SA
○ AH
○ ESP
○ SASL
○ SAML
● Pretty Good Privacy
● Secure Socket Layer (SSL)
○ TLS Understanding digital certificates and signatures.
● Risk management
○ Overall Audit Risk
○ Risk based approach
○ Evidence
○ Evidence gathering techniques
○ Sampling
○ Control Self-Assessment
● Risk analysis
○ Purpose of risk analysis
○ Risk based auditing
○ Types of Control
○ Risk Assessment using SimpleRisk or Eramba (Open source Tools)
○ Using Linux Commands for auditing - top, ps, find, who, netstat etc.
● EDR
○ Evidence Checkout Log
○ Handling Evidence
○ First Response
○ Formulate/Execute Response Strategy
○ Forensic duplication
○ Authenticate the Evidence
○ Investigation
○ Common Mistakes
○ Detection