0% found this document useful (0 votes)
11 views2 pages

Course Curriculum

Uploaded by

Divyansh Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

Course Curriculum

Uploaded by

Divyansh Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Curriculam

Course Code: CSE436 Credit Units L T P/S SW AS/DS FW No. of PSDA Total Credit Unit
Course Level UG 3 0 0 0 0 0 0 3
Course Title Cyber Security

Course
Description :

Course Objectives :

SN
Objectives
.
The purpose of this course to accustom the students about the threats, vulnerabilities, and their consequences. The objective is to educate them
1
about importance of cybersecurity, implications to organizations and fundamentals to cybersecurity management

Pre-Requisites : General

SN. Course Code Course Name

Course Contents / Syllabus :

SN. Module Descriptors / Topics Weightage


Definition of Netizen, Malware and its existence, Definition of Security hole, Security Patch, Viruses, Worms, Trojan
Introduction Horses, Bot Networks, Social Engineering, Avoiding Malwares, Spyware, Adware, Keyboard Loggers, Rogue
1 to Software and Scareware, Ransomeware, White Hat Search Engine Optimization, Current and Fulltime Threats, 20.00
Cyberspace Hackers, Hacker’s tools, E-Mail and SPAM, Spoofing, Spammer’s tools, SPIM, Cyberbullies, Online Reputation
Attacks, Phishing, Cyber stalkers
Threats, vulnerabilities, and consequences, Advanced persistent threats, The state of security today, Why security
The Security
2 matters, introduction to cryptography, Access Control, Software Development Security, Introduction to Cyber 20.00
Environment
security and its importance
Principles of
The interrelated components of the computing environment, Cybersecurity models (the CIA triad, the star model, the
3 Cyber 20.00
Parkerian hexad), computer security, information security, and information assurance
security
Cost of Cybercrimes and IPR Issues: Lesson for Organizations, Web Threats for Organizations: The Evils and
Perils, Security and Privacy Implications from Cloud Computing, Social Media Marketing: Security Risk and Perils for
Organizationa Organization, Social Computing and the Associated Challenges for Organizations, Protecting People’s Privacy in the
4 20.00
l Implications Organization, Organizational Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage
Policy, Incident Handling: An Essential Component, Intellectual Property in the Cyberspace of Cyber security,
Importance of Endpoint Security in Organizations.
Cyber Cybersecurity Management Concepts, Security governance, Management models, roles, and functions, Enterprise
5 security Roles and Structures, Information security roles and positions, Strategic planning and security strategy, The 20.00
Management information security life cycle, The System Security Plan (SSP)

Course Learning Outcomes :

SN. Course Learning Outcomes


1 Describe various type of cyber attacks
2 Explain the importance of security in cyberspace
3 Discuss various cyber security models
4 Summarize various implications of cyber crime to the organization
5 Describe various strategies for management of cyber security

Pedagogy for Course Delivery :

SN. Pedagogy Methods


1 Classroom Teaching using Whiteboard and PowerPoint Presentation

Theory /VAC / Architecture Assessment (L,T & Self Work): 100.00 Max : 100

Attendance+CE+EE : 5+35+60

SN. Type Component Name Marks


1 Attendance 5.00
2 End Term Examination (OMR) 60.00
3 Internal CLASS TEST 15.00
4 Internal CLASS QUIZ 10.00
5 Internal HOME ASSIGNMENT 10.00

Lab/ Practical/ Studio/Arch. Studio/ Field Work Assessment : 0.00 Max : 100

N/A

List of Professional skill development activities :

No.of PSDA : 0
SN. PSDA Point

Text & References :

SN. Type Title/Name Description ISBN/ URL


• Cybersecurity, Wiley Publishers, Nina
1 Book
Godbole and Sunit Belapur
• Cybersecurity: Managing Systems,
2 Book Conducting Testing and Investigating
Intrusions, Wiley, Thomas J.
• Cybersecurity and Cyberwar: What
3 Book Everyone Needs to Know, Oxford
University Press, Peter W. Singer
• Enterprise Cybersecurity, Scott Donaldson
4 Book
and Stanley Siegel
• Cybersecurity: The Essential Body of
5 Book Knowledge, Delmar Cengage Learning,
Dan Shoemaker and Wm. Art

You might also like