0% found this document useful (0 votes)
8 views

Course Outline

The document outlines a comprehensive course on Information Security, covering topics such as network classification, threats and attack modes, cryptographic models, and malware attacks. It includes practical assignments involving Wireshark and Winsock2 for hands-on experience. Additionally, it addresses database security, firewalls, and optional content on AI and cybersecurity.

Uploaded by

kiyopon.owarida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Course Outline

The document outlines a comprehensive course on Information Security, covering topics such as network classification, threats and attack modes, cryptographic models, and malware attacks. It includes practical assignments involving Wireshark and Winsock2 for hands-on experience. Additionally, it addresses database security, firewalls, and optional content on AI and cybersecurity.

Uploaded by

kiyopon.owarida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

Information Security - Course Outline

1) Introduction to Information Security


a) Classification of Networks (LAN,WAN,ARPAnet etc.)
b) CyberSecurity vs InformationSecurity
c) Protocol, OSI Model, Packet Encapsulation, TCP/IP vs OSI and, Internet
Structure
d) Information Security
e) X.800 Architecture [IMPORTANT]

2) Threats and Attack Modes


a) Attack Surfaces & Attack Trees
b) Security Attacks
c) Security Services
d) Model of Network Security

3) Cryptographic Models
a) Cryptographic Tools
b) Symmetric Encryption vs Asymmetric Encryption
c) Block vs Stream ciphers
d) Message Authentication
e) Hash Functions
f) Public Key vs Private Key
g) Public Key Certificates + Digital Envelopes
h) Random Numbers vs Psuedo Numbers

4) Information Security Protocols and Standards

a) SSL vs TLS
b) HTTP vs HTTPS (HTTP over SSL)
c) IP Sec (Benefits + Scope)
d) Transport and Tunnel Modes

5) Checksums

a) TCP Checksum
b) CRC

6) DoS Attacks

a) DoS?
b) Classic DoS Attacks
c) Spoofing
d) Backscatter Traffic
e) SYN spoofing
f) TCP connection handshake
g) Flood Attacks
h) UDP Packets
i) DDoS Attacks
j) SIP invite scenario
k) HTTP attacks
l) Reflection attacks
m) DNS attacks
n) Amplification attacks
o) Attack Prevention

7) ICMP and Traceroute

a) ICMP echo request


b) Traceroute [IMPORTANT]

8) Malware Attacks

a) Malware
b) Malicious Software
c) Types of Malware
d) Anti Virus
e) Digital immune System
f) Behaviour Blocking Software
g) Worms
h) Proactive Worm containment
i) Mobile code
j) Client-side Vulnerabilities
k) Social Engineering, spam and Trojans
l) Payload Attacks and bots (Zombies/Drone) [IMPORTANT]
m) Rootkit
n) Counter Measures

9) Database Security

a) Importance of Data
b) Identity Theft
c) Levels of Data Security
d) Physical/ OS Security
e) Database Encryption
f) SQL Authorization
g) Access Control in Application Layer
h) Oracle Virtual Private Database
i) Privacy
j) Application Security
k) SQL Injection
l) Outside vs Insider Attack
m) Corruptions + Information Leakage

10) NIDS/NIPS

a) Snort3 + Suricata
b) Intruders + Types
c) NIDS and HIDS
d) Anomaly Detection
e) Signature + Heuristic Detection
f) Passive sensors
g) Logging for Alerts
h) HoneyPot

11) Firewall

a) Firewall Access Policy


b) Types of Firewalls
c) Packet Filtering based on Firewall
d) Connection Stable Table
e) Proxy
f) Gateway vs Packet Filtering vs Application Level Firewall
g) Bastion Hosts
h) VPN
i) Distributed Firewalls
j) Topologies of Firewalls
k) Unified Threat Management Products
12) AI and CyberSecurity [OPTIONAL]

Resources:

https://learn.saylor.org/course/view.php?id=453&sectionid=16633#section-1

Assignment 1:

1) Use wireshark on whatsapp and analyze what is happening

Assignment 2:

1) Winsock2
2) 3 Clients + 1 Server

You might also like