0% found this document useful (0 votes)
12 views7 pages

Cyber Lab

The document outlines the lesson plan for the CCS340 Cyber Security Lab course at P.S.N.A. College of Engineering & Technology for the academic year 2023-24. It details course objectives, outcomes, equipment, textbooks, and assessment tools, emphasizing the importance of understanding cybercrime, cyber law, and various cyber-attack techniques. Additionally, it includes the vision, mission, program educational objectives, and specific outcomes for graduates in the Computer Science and Business Systems program.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views7 pages

Cyber Lab

The document outlines the lesson plan for the CCS340 Cyber Security Lab course at P.S.N.A. College of Engineering & Technology for the academic year 2023-24. It details course objectives, outcomes, equipment, textbooks, and assessment tools, emphasizing the importance of understanding cybercrime, cyber law, and various cyber-attack techniques. Additionally, it includes the vision, mission, program educational objectives, and specific outcomes for graduates in the Computer Science and Business Systems program.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7

P.S.N.A.

COLLEGE OF ENGINEERING & TECHNOLOG


(An Autonomous Institution affiliated to Anna University, Chennai)
Kothandaraman Nagar, Muthanampatti (PO), Dindigul – 624 622.
Phone: 0451-2554032,2554349 Web Link: www.psnacet.org

LESSON PLAN

Subject code & Name : CCS340 CYBER SECURITY Lab


Course & Branch :B.Tech - Computer Science & Business Systems
Year & Semester :III/ V
Name of the Faculty :Mrs M.Jothi
Academic Year : 2023-24[EVEN-Semester]
Course Code : CCS340 P Contact Hours : 2Hrs / Week
Pre-requisite :
Total No. of Contact Hours : 30
1. Basic Linux Commands
Course Objectives :
 To learn cybercrime and cyber law.
 To understand the cyber-attacks and tools for mitigating them.
 To understand information gathering.
 To learn how to detect a cyber-attack.
 To learn how to prevent a cyber-attack.

Course Outcomes :

CO1: Explain the basics of cyber security, cybercrime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)
LIST OF EQUIPMENT:

SOFTWARE: Kali Linux

TEXT BOOKS:
1.Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten

REFERENCE BOOKS:
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. 2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. 3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley
Publishers, 2007 (Unit 3)
4. 4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third
Edition, Pearson Education, 2015 (Units 4 and 5)
5. 5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab Martin C. Brown, “Python: The Complete Reference”, 4th Edition, Mc-
GrawHill, 2018.
VISION STATEMENT OF THE DEPARTMENT:
To be centre of excellence in the field of Computer Science and Business System education, producing globally
competent professionals with social responsibilities.

MISSION STATEMENTS OF THE DEPARTMENT:

M1: Sustain an environment conducive to quality education in engineering and research.

M2: Provide a learning ambience to enhance problem solving skills, leadership qualities and team spirit with
ethical responsibilities.

M3: Evolve with the recent trends in industry to develop inter-disciplinary innovative systems and
entrepreneurship.

PROGRAM EDUCATIONAL OBJECTIVES (PEOs)

The Program Educational Objectives (PEOs) which describes expected accomplishments of our graduates of the
B.Tech CS & BS program are:

PEO1:To ensure graduates will be proficient in utilizing the fundamental knowledge of basic sciences,
mathematics, Computer Science and Business systems for the applications relevant to various streams of
Engineering and Technology.
PEO2:To enrich graduates with the core competencies necessary for applying knowledge of computer science
and Data analytics tools to store, retrieve, implement and analyze data in the Context of business enterprise.
PEO3:To enable graduates to gain employment in organizations and establish themselves as professionals by
applying their technical skills and leadership qualities to solve real world problems and meet the diversified
needs of industry, academic and research.
PEO4:To equip the graduates with entrepreneurial skills and qualities which help them to perceive the
functioning of business, diagnose business problems, explore the entrepreneurial opportunities and prepare them
to manage business efficiently.

PROGRAM OUTCOMES (POs)


Computer Science and Business System Graduates will be able to:

PO1: Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
engineering specialization to the solution of complex engineering problems.
PO2: Problem analysis: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
PO3: Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public health and
safety, and the cultural, societal, and environmental considerations.

PO4: Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data, and synthesis of the information to provide
valid conclusions.
PO5: Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools including prediction and modeling to complex engineering activities with an understanding of the
limitations.
PO6: The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.
PO7: Environment and sustainability: Understand the impact of the professional engineering solutions in
societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.
PO9: Individual and team work: Function effectively as an individual, and as a member or leader in diverse
teams, and in multidisciplinary settings.
PO10: Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear instructions.
PO11: Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage projects
and in multidisciplinary environments.
PO12: Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent
and life-long learning in the broadest context of technological change

PROGRAM SPECIFIC OUTCOMES (PSOs)


PSO1:To create, select and apply appropriate techniques, resources, modern engineering and business tools
including prediction and data analytics to complex engineering activities and business solutions.
PSO2:To evolve computer science domain specific methodologies for effective decision making in several
critical problem domains of the real world.
PSO3:To be able to apply entrepreneurial skills and management tools for identifying analyzing and
creating business opportunities with smart business ideas.
PSO4: To manage complex IT projects with consideration of the human, financial, ethical and environmental
factors and an understanding of risk management processes, and operational and policy implications
Mapping of Course Outcomes (COs) with Programme Outcomes (Pos) and PSOs

Course Program Outcomes / PSO’s


Outcomes 3 4 5 6 7 8 9 10
1 2 11 12 PSO2 PSO3
PSO1
CO1: 3 2 3 2 3
CO2: 3 2 2 2 3
CO3: 2 2 3 2 3
CO4: 2 2 3 2 3
CO5 2 2 2 3 2 3
CO6 2 2 3 3 2 2 2 2 2 2 2
AVG 2 2 3 3 2 3 2 2 2 2
Mapping of CO, PO/PSO with Programme Educational Objectives (PEOs) :

Programme
Course Programme Outcomes
Educational
Outcomes & PSO’s
Objectives
CO1 1,2,3,8,9 1,2,3
CO2 1,2,3,8,9 1,2,3
CO3 1,2,3,8,9 1,2,3
CO4 1,2,3,8,9 1,2,3

CO5 1,2,3,5,8,9 1,2,3


CO6 1,2,3,5,8,9,10,11, PSO1,2,3 1,2,3
CO-PO/PSO Mapping Justification

Course Schedule
Ex. Hour References Actual date of
COs List of Experiments S/wused
No Reqd. completion
1. Install Kali Linux on Virtual box Kali 22.11.22
1. 2 Linux
CO1

CO2 2. Explore Kali Linux and bash scripting 6.12.22

2
2.

13.12.22
2
3. Perform open source intelligence
CO3 gathering using Netcraft, Whois Lookups,
3.
DNS Reconnaissance, Harvester and
Maltego

2 4. Understand the nmap command d and 20.12.22


scan a target using nmap

CO4
4.

3.1.23
5. Install metasploitable2 on the virtual box
5 2 and search for unpatched vulnerabilities

10.1.23
CO4
6. Use Metasploit to exploit an unpatched
6 vulnerability

7 2 7. Install Linus server on the virtual box 31.1.23


and install ssh

.
2 8. Use Fail2banto scan log files and ban Ips 7.2.23
8
that show the malicious signs
9. Launch brute-force attacks on the Linux 14.2.23
9 2 server using Hydra.

.
10. Perform real-time network traffic 21.2.23
10 2 analysis and data pocket logging using
Snort

Assessment Tools:

Course Period of
Assessment Tools
Outcomes Assessment
CO1 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO2 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO3 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO4 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO5 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO6 End of the Lab session
Observation, Record, Model Examination
End of the Semester
Faculty In-Charge HOD-CS&BS

You might also like