The document outlines a lecture plan for a course on fundamentals of cyber security. It is divided into 6 modules that will be covered over 60 lecture hours. Module 1 covers introduction to computer networking and TCP/IP architecture. Module 2 discusses basics of computer security, threats, and attacks. Module 3 focuses on network-based attacks and wireless threats. Module 4 examines firewalls, intrusion detection, and prevention systems. Module 5 looks at intelligence gathering, vulnerability scanning, and penetration testing. Module 6 addresses incident response, case studies, and proactive security management. The plan allocates an additional 4 hours for internal assessment and semester exam preparation, totaling 64 hours.
The document outlines a lecture plan for a course on fundamentals of cyber security. It is divided into 6 modules that will be covered over 60 lecture hours. Module 1 covers introduction to computer networking and TCP/IP architecture. Module 2 discusses basics of computer security, threats, and attacks. Module 3 focuses on network-based attacks and wireless threats. Module 4 examines firewalls, intrusion detection, and prevention systems. Module 5 looks at intelligence gathering, vulnerability scanning, and penetration testing. Module 6 addresses incident response, case studies, and proactive security management. The plan allocates an additional 4 hours for internal assessment and semester exam preparation, totaling 64 hours.
Lecture Plan of Fundamentals of Cyber Security (GE4B-05) of BBA 4th Semester
Contact: 6L Credit: 6 Faculty: Mr. Souvik Paul Lecture Hours: 60
Module No. Topics Lecture Hours
Introduction to Computer Networking 1 History of Internet 1 Layered Architecture and OSI Model 1 OSI Layer Details 1 OSI Layer Details 1 OSI Layer Details 1 OSI Layer Details 1 Module 1 OSI Layer Details 1 OSI Protocol and Services 1 TCP/IP Architecture 1 TCP/IP Layers 1 TCP/IP Layers 1 Brekely Socket API 1 Digital Transmission Fundamentals 1 Case Study 1 Basics of Computer Security for Business 1 Confidentiality 1 Integrity 1 Module 2 Availability 1 Tools, Part and Protocol used 1 Different types of Resources 1 User and User based Attacks 1 Phishing 1 Matrices 1 Social Engineering 1 Authentication Based Attacks 1 Module 3 Network Based Attacks 1 Denial of Service Attacks 1 Wireless based Attacks 1 Virus and Worms 1 Mobile based Attacks 1 Cloud Security 1 Web Based Attacks 1 Introduction to Computer Firewall Basics 1 Advanced firewalls 1 Module 4 Types of Firewalls Configurations 1 Intrusion Detection 1 Chapter No. Topics Lecture Hours Intrusion Detection System 1 Intrusion Prevention 1 Honypots 1 Anti-virus/anti-malware 1 Module 4 Snort1, HIDs and HIPs 1 Splunk and Security 1 Understanding IPS 1 Understanding IDS 1 Module
Information Sharing Process 1
Threat Intelligence 1 Resource for building own testing Environment 1 Coding Standards 1 Module 5 Intelligence Gathering 1 Vulnerability Scanning 1 Exploitation 1 Common Pen Testing 1 Nmap , Nessus 1 Metasploit 1 Proactive computer security management 1 Legal issues 1 Module 6 Where to turn if you have an incident 1 Case Study 1 Case Study 1 Total No. of Lecture Hours 60 Internal Assessment Examination & Preparation of Semester Examination 4 Total 64
Suggested Reference Books:
1. Data communication and Networking by Behrouz A. Forouzan, McGraw Hill Pvt. Ltd. 2. Certified Ethical Hacker Certification Exam , Education (India)