0% found this document useful (0 votes)
16 views

Cyber Security Lecture

The document outlines a lecture plan for a course on fundamentals of cyber security. It is divided into 6 modules that will be covered over 60 lecture hours. Module 1 covers introduction to computer networking and TCP/IP architecture. Module 2 discusses basics of computer security, threats, and attacks. Module 3 focuses on network-based attacks and wireless threats. Module 4 examines firewalls, intrusion detection, and prevention systems. Module 5 looks at intelligence gathering, vulnerability scanning, and penetration testing. Module 6 addresses incident response, case studies, and proactive security management. The plan allocates an additional 4 hours for internal assessment and semester exam preparation, totaling 64 hours.

Uploaded by

Sayan Majumder
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Cyber Security Lecture

The document outlines a lecture plan for a course on fundamentals of cyber security. It is divided into 6 modules that will be covered over 60 lecture hours. Module 1 covers introduction to computer networking and TCP/IP architecture. Module 2 discusses basics of computer security, threats, and attacks. Module 3 focuses on network-based attacks and wireless threats. Module 4 examines firewalls, intrusion detection, and prevention systems. Module 5 looks at intelligence gathering, vulnerability scanning, and penetration testing. Module 6 addresses incident response, case studies, and proactive security management. The plan allocates an additional 4 hours for internal assessment and semester exam preparation, totaling 64 hours.

Uploaded by

Sayan Majumder
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

The Heritage Academy

Lecture Plan of Fundamentals of Cyber Security (GE4B-05) of BBA 4th Semester


Contact: 6L
Credit: 6
Faculty: Mr. Souvik Paul
Lecture Hours: 60

Module No. Topics Lecture Hours


 Introduction to Computer Networking 1
 History of Internet 1
 Layered Architecture and OSI Model 1
 OSI Layer Details 1
 OSI Layer Details 1
 OSI Layer Details 1
 OSI Layer Details 1
Module 1  OSI Layer Details 1
 OSI Protocol and Services 1
 TCP/IP Architecture 1
 TCP/IP Layers 1
 TCP/IP Layers 1
 Brekely Socket API 1
 Digital Transmission Fundamentals 1
 Case Study 1
 Basics of Computer Security for Business 1
 Confidentiality 1
 Integrity 1
Module 2  Availability 1
 Tools, Part and Protocol used 1
 Different types of Resources 1
 User and User based Attacks 1
 Phishing 1
 Matrices 1
 Social Engineering 1
 Authentication Based Attacks 1
Module 3  Network Based Attacks 1
 Denial of Service Attacks 1
 Wireless based Attacks 1
 Virus and Worms 1
 Mobile based Attacks 1
 Cloud Security 1
 Web Based Attacks 1
 Introduction to Computer Firewall Basics 1
 Advanced firewalls 1
Module 4  Types of Firewalls Configurations 1
 Intrusion Detection 1
Chapter No. Topics Lecture Hours
 Intrusion Detection System 1
 Intrusion Prevention 1
 Honypots 1
 Anti-virus/anti-malware 1
Module 4  Snort1, HIDs and HIPs 1
 Splunk and Security 1
 Understanding IPS 1
 Understanding IDS 1

Module

Information Sharing Process 1


 Threat Intelligence 1
 Resource for building own testing Environment 1
 Coding Standards 1
Module 5  Intelligence Gathering 1
 Vulnerability Scanning 1
 Exploitation 1
 Common Pen Testing 1
 Nmap , Nessus 1
 Metasploit 1
 Proactive computer security management 1
 Legal issues 1
Module 6  Where to turn if you have an incident 1
 Case Study 1
 Case Study 1
Total No. of Lecture Hours 60
Internal Assessment Examination & Preparation of Semester Examination 4
Total 64

Suggested Reference Books:

1. Data communication and Networking by Behrouz A. Forouzan, McGraw Hill Pvt. Ltd.
2. Certified Ethical Hacker Certification Exam , Education (India)

You might also like