0% found this document useful (0 votes)
16 views

Lect 01 ITS Syllabus

Uploaded by

thebigbull405
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Lect 01 ITS Syllabus

Uploaded by

thebigbull405
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

IT SECURITY

PROF.(DR.) SATISH N. GUJAR


Unit 1: Foundations of IT Security
 Introduction to IT Security
o Importance of IT Security
o Evolution of Cyber Threats
o Principles of Confidentiality, Integrity, and Availability (CIA Triad)
 Physical Security Principles
o Assessing Physical Security Risks
 Site Surveys and Risk Assessments
 Threat Modeling Techniques
o Implementing Physical Security Controls
 Perimeter Security (Fencing, Gates)
 Access Control Systems (Biometrics, RFID)
 Surveillance Systems (CCTV, Motion Sensors)
 Host Security
o Host Hardening Techniques
 Patch Management
 Endpoint Protection Solutions (Antivirus, Anti-Malware)
o Operating System Security
 User Authentication and Access Control
 File System Encryption
o Application Security Best Practices
 Secure Coding Principles

Unit 2: Network Security Fundamentals
 Understanding Network Fundamentals
o Types of Networks and Components
 Local Area Networks (LANs)
 Wide Area Networks (WANs)
o Standard Network Models
 OSI Model
 TCP/IP Protocol Suite
 Network Security Threats and Controls
o Common Network Security Threats
 Malware (Viruses, Worms, Trojans)
 Phishing Attacks
o Network Security Controls and Protocols
 Access Control Lists (ACLs)
 Secure Socket Layer (SSL)/Transport Layer Security (TLS)
 Firewall Configuration and Management
o Types of Firewalls and Their Functions
 Packet Filtering Firewalls
 Stateful Inspection Firewalls
o Configuring and Managing Firewalls
 Firewall Rule Design and Implementation
 Firewall Logging and Monitoring
Unit 3: Security Controls and Tools
 Intrusion Detection and Prevention
o Intrusion Detection Systems (IDS)
 Network-Based IDS (NIDS)
 Host-Based IDS (HIDS)
o Intrusion Prevention Systems (IPS)
 Signature-Based IPS
 Behavior-Based IPS
 Virtual Private Networks (VPN)
o VPN Components and Technologies
 VPN Concentrators
 VPN Protocols (IPsec, SSL VPN)
o Configuring and Managing VPNs
 VPN Client Configuration
 Site-to-Site VPN Deployment
 Wireless Network Defense
o Wireless Network Threats and Countermeasures
 Rogue Access Points
 Evil Twin Attacks
o Implementing Wireless Security Controls
 Wi-Fi Protected Access (WPA/WPA2)
Wireless Intrusion Detection Systems (WIDS)
Unit 4: Incident Response and Management
 Understanding Incident Response
o Incident Handling Process
 Preparation
 Identification
 Containment
 Eradication
 Recovery
 Lessons Learned
o First Responder Responsibilities
 Initial Incident Assessment
 Evidence Preservation
 Incident Detection and Analysis
o Network Traffic Monitoring and Analysis
 Packet Sniffing Tools (Wireshark)
 Log Analysis
o Identifying Security Incidents
 Indicators of Compromise (IOCs)
 Anomaly Detection Techniques
 Incident Containment and Recovery
o Containment Strategies
 Isolation of Affected Systems
 Blocking Malicious Traffic
o Recovery and Resilience Planning
 Data Restoration Procedures
 Business Continuity Plans
Unit 5: Risk Management and Vulnerability Assessment
 Risk Management Principles
o Risk Identification and Assessment
 Asset Identification
 Threat Assessment
 Vulnerability Assessment
o Risk Mitigation Strategies
 Risk Acceptance
 Risk Avoidance
 Risk Transfer
 Vulnerability Assessment
o Conducting Vulnerability Scans
 Automated Scanning Tools (Nessus, OpenVAS)
 Manual Vulnerability Assessment Techniques
o Vulnerability Remediation Techniques
 Patch Management Processes
Unit 6: Data Protection and Backup Strategies
 Data Backup and Recovery
o Backup Strategies and Best Practices
 Full, Incremental, and Differential Backups
 Offsite Data Storage
o Data Recovery Techniques
 Bare-Metal Recovery
 Data Replication
 Ensuring Data Integrity
o Data Encryption Methods
 Symmetric Encryption Algorithms (AES)
 Asymmetric Encryption Algorithms (RSA)
o Securing Data Storage Solutions
 Disk Encryption Technologies (BitLocker, FileVault)

You might also like