0% found this document useful (0 votes)
44 views3 pages

Cyber Sphere and Cybersecurity v2

The document outlines a comprehensive curriculum on Cyber Sphere and Cybersecurity, covering fundamental networking concepts, essential cybersecurity principles, security testing, social engineering techniques, and digital forensics. It includes modules on network architecture, types of attacks, data security, access control, and cyber laws. Additionally, it provides various resources for further learning and understanding of the topics discussed.

Uploaded by

daradediya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views3 pages

Cyber Sphere and Cybersecurity v2

The document outlines a comprehensive curriculum on Cyber Sphere and Cybersecurity, covering fundamental networking concepts, essential cybersecurity principles, security testing, social engineering techniques, and digital forensics. It includes modules on network architecture, types of attacks, data security, access control, and cyber laws. Additionally, it provides various resources for further learning and understanding of the topics discussed.

Uploaded by

daradediya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber Sphere and Cybersecurity – IIFT

Module 1: Fundamentals of Networking:


 Understanding of Network Architecture
 Network Components: Routers, Switches, Access points, Firewalls,
 Network Topology Architectures
 Common Ports, and Protocols
 TCP UDP and 3-Way Handshake
 IP Addresses, MAC Addresses
 OSI Model
 Network Attacks
 Introduction to Intrusion Detection System
 Virtual Private Network
Module 2: Introduction to Cybersecurity:
 Defining Cyberspace and Overview of Computer and Web
Technology
 Architecture of Cyberspace Communication and Web Technology
 Internet
 World Wide Web
 Advent of Internet
 Internet Infrastructure for Data Transfer and Governance
 What is Cybersecurity
Module 3: Essential Cyber Security Concepts:
 Layers of Security
 Vulnerability
 Threat
 Types of Attacks
 Taxonomy of Various Attacks
 Types of Malwares
 Physical Security, Personnel Security
 Secure Development Process
3.a Data Security:
 Confidentiality, Integrity, Availability
 Encryption and Decryption
3.b Access Control:
 Identification, Authentication, Authorization
 Identity Access Management
Module 4: Security Testing and Deep dive into social engineering
attacks:
4.a Security Testing:
 Introduction to security testing
 Understanding the concepts of Vulnerability Scanning and its real-
time applications.
 Understanding the concepts of Penetration Testing and its
applications
 Importance of Ethical Hacking and its applications

4.b Social Engineering Techniques:


 Phishing, Pretexting, Baiting, Quid Pro Quo, Tailgating, Dumpster
Diving, Vishing
 How to Manipulate and Exploit Human Behaviour
 Social Engineering in the Digital Age
 Emerging Trends in Social Engineering Tactics
 Best Practices for Protecting Against Advanced Social Engineering
Threats
Module 5: Introduction to Digital Forensics, IR, Cyber Crime and Cyber
Laws, Privacy:
 Digital Forensics
 Business Continuity and Disaster Recovery
 Risk Assessment and Management
 Cyber Crimes and Cyber Laws
 Cyber Threats-Cyber Warfare
 Cyber Terrorism & Cyber Espionage
 Privacy

Resources:
https://www.geeksforgeeks.org/basics-computer-networking/
https://www.geeksforgeeks.org/tcp-3-way-handshake-process/
https://www.geeksforgeeks.org/open-systems-interconnection-model-osi/
https://www.geeksforgeeks.org/how-does-the-internet-work/
https://www.simplilearn.com/tutorials/cyber-security-tutorial/cyber-security-for-
beginners
https://www.sailpoint.com/identity-library/cia-triad
https://www.geeksforgeeks.org/cryptography-and-its-types/
https://www.microsoft.com/en-in/security/business/security-101/what-is-identity-
access-management-iam
https://www.upguard.com/blog/vulnerability
https://www.balbix.com/insights/what-is-a-vulnerability/
https://www.hackerone.com/knowledge-center/what-security-testing
https://www.geeksforgeeks.org/security-testing/
https://www.ibm.com/think/topics/penetration-testing
https://www.proofpoint.com/us/threat-reference/social-engineering
https://www.ibm.com/think/topics/dfir
https://www.proofpoint.com/us/threat-reference/cyber-crime
https://cybercrime.gov.in/webform/crimecatdes.aspx
https://www.lexisnexis.in/blogs/cyber-law-in-india/
https://www.imperva.com/learn/application-security/cyber-warfare/
https://www.ibm.com/think/topics/business-continuity-disaster-recovery
https://www.ibm.com/think/topics/cyber-risk-management
https://www.ibm.com/think/topics/data-privacy
https://www.digitalguardian.com/blog/what-indias-digital-personal-data-
protection-dpdp-act-rights-responsibilities-everything-you

You might also like