CT702-N Cyber Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

 

Kadi Sarva Vishwavidyalaya   
Faculty of Engineering & Technology 
Fourth Year Bachelor of Engineering (Computer/IT) 
 (To be Proposed For: Academic Year 2020‐21) 
 
   
Subject Code: CT702-N Subject Title: Cyber Security
Pre-requisite Computer Networks and Cryptography & Network security

Teaching scheme Evaluation Scheme


Total
Theory IE CIA Pract. Total
L T P Total Credit
Marks Marks Marks Marks
Hrs Hrs Hrs Hrs Hrs Marks
03 00 02 05 04 03 70 30 20 30 150

LEARNING OBJECTIVES:
 To understand, the foundation of compiler and mathematical models of computation.
 To understand, what compiler could do and what it couldn’t.
 To check the correctness of the compiler and measure the speed (runtime and compile time)
 To see the degree of optimization.
 To check error reporting and analysis (feedback) to user.
OUTLINE OF THE COURSE:

Sr. Title of the Unit Minimum


No Hours
1 Privacy control concept & Overview. 6

2 Information Security Concepts. 6

3 Security Threats and vulnerabilities. 5

4 Cryptography. 7

5 Security Management Practices. 8

6 Access Control and Intrusion Detection. 7

7 Phishing techniques. 5

8 Hands on Open source. 4

DETAILED SYLLABUS:

Page 1 of 4 
 
 
Kadi Sarva Vishwavidyalaya   
Faculty of Engineering & Technology 
Fourth Year Bachelor of Engineering (Computer/IT) 
 (To be Proposed For: Academic Year 2020‐21) 
 
   
Topic Weight
Sr. Lecture
age
No Hours
(%)
Privacy control concept & Overview.
What is Privacy? Methods to control privacy. Data collection from social
networks, challenges, opportunities, and pitfalls in securities, other
1 06 13
APIs. Privacy breach, Collecting data from Online Social Media.
Trust, credibility, and reputations in social systems. privacy
Policing and preserving. Information privacy disclosure, revelation
and its effects in OSM and networks.
Information Security Concepts.
2 Information Security Overview , Information Security Services , 06 13
Types of Attacks, Goals for Security, E-commerce security, Computer
Forensics, Security Engineering
Security Threats and vulnerabilities.
3 Overview of Security threats, Hacking Techniques, Insecure Network 05 10
connections.
Cryptography.
4 Introduction to Cryptography, Symmetric key Cryptography, 07 15
Asymmetric key Cryptography, Message Authentication and Hash
functions, Digital Signatures, Public Key infrastructure.
Security Management Practices.
5 Overview of Security Management, Information Classification Process, 08 16
Security Policy, Risk Management, Security Procedures and
Guidelines, Business Continuity and Disaster Recovery.
Access Control and Intrusion Detection.
6 Overview of Identification and Authorization, I & A Techniques , 07 15
Overview of IDS , Intrusion Detection Systems and Intrusion,
Prevention Systems.
Phishing techniques.
7 Methods of Phishing, Phishing Techniques, Spear phishing, Types of 05 10
phishing scams, Phishing Toolkits and Spy Phishing, Phishing
Countermeasures.
Hands on Opensource.
IPV4, IPV6, IP assigning, MAC, Bridging, Raid protocols, Linux
8 remote connection: (Remote login, transfer file), Remote session( 04 8
OpenSSh Configuration), Logs introduction, log files( Messages,
dmesg, Audit log), cron.
Total 48  100 

Page 2 of 4 
 
 
Kadi Sarva Vishwavidyalaya   
Faculty of Engineering & Technology 
Fourth Year Bachelor of Engineering (Computer/IT) 
 (To be Proposed For: Academic Year 2020‐21) 
 
   
INSTRUCTIONAL METHOD AND PEDAGOGY: (Continuous Internal Assessment (CIA)
Scheme)

At the start of course, the course delivery pattern, prerequisite of the subject will be
discussed.
Lectures will be conducted with the aid of multi-media projector, black board, OHP
etc.
Attendance is compulsory in lecture which carries 10 marks in overall evaluation.
One internal exam will be conducted as a part of internal theory evaluation.
Assignments based on the course content will be given to the students for each unit
and will be evaluated at regular interval evaluation.
Surprise tests/Quizzes/Seminar/tutorial will be conducted having a share of five marks in
the overall internal evaluation.
The course includes a laboratory, where students have an opportunity to build an
appreciation for the concepts being taught in lectures.
Experiments shall be performed in the laboratory related to course contents.

REFERENCE BOOKS:

The following texts will serve as the primary resources for this course:

 Rhodes-Ousley, Mark. Information Security: The Complete Reference, Second Edition, .


Information Security Management: Concepts and Practice. New York, McGraw-Hill, 2013.

 Whitman, Michael E. and Herbert J. Mattord. Roadmap to Information Security for IT and
InfoSec Managers. Boston, MA: Course Technology, 2011.

Page 3 of 4 
 
 
Kadi Sarva Vishwavidyalaya   
Faculty of Engineering & Technology 
Fourth Year Bachelor of Engineering (Computer/IT) 
 (To be Proposed For: Academic Year 2020‐21) 
 
   
LIST OF PRACTICAL:

Sr. No. Name of experiment

1 To study about cyber security and analysis intruders and threats.

2 To study Linux advance commands for cyber security.

3 Implementation of methods using Phishing Toolkits

4 Implementation of methods penetration techniques.

5 Implementation of methods to Controls to enforce security services

6 Hardening OS by IP Tables Implementations.

7 Server Configuration for secure

8 To study about cyber security and analysis intruders and threats.

9 To analysis Insecure Network connections by different tools.

10 Identifying security breach in Social Medial network.

Page 4 of 4 
 

You might also like