Cyber Lab
Cyber Lab
LESSON PLAN
Course Outcomes :
CO1: Explain the basics of cyber security, cybercrime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)
LIST OF EQUIPMENT:
TEXT BOOKS:
1.Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten
REFERENCE BOOKS:
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. 2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. 3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley
Publishers, 2007 (Unit 3)
4. 4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third
Edition, Pearson Education, 2015 (Units 4 and 5)
5. 5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab Martin C. Brown, “Python: The Complete Reference”, 4th Edition, Mc-
GrawHill, 2018.
VISION STATEMENT OF THE DEPARTMENT:
To be centre of excellence in the field of Computer Science and Business System education, producing globally
competent professionals with social responsibilities.
M2: Provide a learning ambience to enhance problem solving skills, leadership qualities and team spirit with
ethical responsibilities.
M3: Evolve with the recent trends in industry to develop inter-disciplinary innovative systems and
entrepreneurship.
The Program Educational Objectives (PEOs) which describes expected accomplishments of our graduates of the
B.Tech CS & BS program are:
PEO1:To ensure graduates will be proficient in utilizing the fundamental knowledge of basic sciences,
mathematics, Computer Science and Business systems for the applications relevant to various streams of
Engineering and Technology.
PEO2:To enrich graduates with the core competencies necessary for applying knowledge of computer science
and Data analytics tools to store, retrieve, implement and analyze data in the Context of business enterprise.
PEO3:To enable graduates to gain employment in organizations and establish themselves as professionals by
applying their technical skills and leadership qualities to solve real world problems and meet the diversified
needs of industry, academic and research.
PEO4:To equip the graduates with entrepreneurial skills and qualities which help them to perceive the
functioning of business, diagnose business problems, explore the entrepreneurial opportunities and prepare them
to manage business efficiently.
PO1: Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an
engineering specialization to the solution of complex engineering problems.
PO2: Problem analysis: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
PO3: Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public health and
safety, and the cultural, societal, and environmental considerations.
PO4: Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data, and synthesis of the information to provide
valid conclusions.
PO5: Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools including prediction and modeling to complex engineering activities with an understanding of the
limitations.
PO6: The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.
PO7: Environment and sustainability: Understand the impact of the professional engineering solutions in
societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.
PO9: Individual and team work: Function effectively as an individual, and as a member or leader in diverse
teams, and in multidisciplinary settings.
PO10: Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able to comprehend and write effective reports and design
documentation, make effective presentations, and give and receive clear instructions.
PO11: Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage projects
and in multidisciplinary environments.
PO12: Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent
and life-long learning in the broadest context of technological change
Programme
Course Programme Outcomes
Educational
Outcomes & PSO’s
Objectives
CO1 1,2,3,8,9 1,2,3
CO2 1,2,3,8,9 1,2,3
CO3 1,2,3,8,9 1,2,3
CO4 1,2,3,8,9 1,2,3
Course Schedule
Ex. Hour References Actual date of
COs List of Experiments S/wused
No Reqd. completion
1. Install Kali Linux on Virtual box Kali 22.11.22
1. 2 Linux
CO1
2
2.
13.12.22
2
3. Perform open source intelligence
CO3 gathering using Netcraft, Whois Lookups,
3.
DNS Reconnaissance, Harvester and
Maltego
CO4
4.
3.1.23
5. Install metasploitable2 on the virtual box
5 2 and search for unpatched vulnerabilities
10.1.23
CO4
6. Use Metasploit to exploit an unpatched
6 vulnerability
.
2 8. Use Fail2banto scan log files and ban Ips 7.2.23
8
that show the malicious signs
9. Launch brute-force attacks on the Linux 14.2.23
9 2 server using Hydra.
.
10. Perform real-time network traffic 21.2.23
10 2 analysis and data pocket logging using
Snort
Assessment Tools:
Course Period of
Assessment Tools
Outcomes Assessment
CO1 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO2 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO3 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO4 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO5 End of the Lab session
Observation, Record, Model Examination
End of the Semester
CO6 End of the Lab session
Observation, Record, Model Examination
End of the Semester
Faculty In-Charge HOD-CS&BS