Cyber Security and Applications
Cyber Security and Applications
2 0 1 2
COURSE OBJECTIVE
The objective of this course is to provide knowledge on the threats and vulnerabilities to web
applications. This is very crucial due to the dependencies of today’s world on web apps and digital
transactions. The course also provides details on how to secure our computer network systems
from malicious activities and attacks.
UNIT-I Networking and Web Technology 7 hours
Network Components - Network Basics - Network Communication -Web Technologies TCPIP -
Web Services
UNIT-II Introduction to Cyber Security 8 hours
Recent Cyber Attacks - Cyber Security Concepts - Layers of Cyber Security - Introduction to
Application Security - Secure Coding OWASP Top 10 - Coding Practices Secure Design – Closure
[Practical demos and code on OWASP vulnerabilities and how to mitigate them]
UNIT-III Fundamentals of Information Security & Fundamentals of Cryptography
7 hours
Why information security? - What is information security? - Data Security - Network security -
Application Security – Closure. Why Cryptography? – Cryptography - Shared Key Cryptography
– Illustration - Shared Key Cryptography - Public Key Cryptography – Illustration - Public Key
Cryptography – Hashing -Digital Signature – Illustration - Digital Signature - Applications of
cryptography – Conclusion [Algorithmic representation of cryptographic methods]
UNIT-IV Threat Modeling & Identity and Access management 6 hours
Basics of Threat Modeling - Learn Threat Modeling with a Use Case - Tool Walkthrough - MS
Threat Modeling Tool – Assignment - Introduction to Identity and Access Management - What
next
UNIT-V Java SE 11 Programmer II: Secure Coding in Java SE 11 Applications 7 hours
Course Overview – Managing Denial of Service – Securing Information – Managing Data
Integrity – Accessibility and Extensibility – Securing Objects – Serialization and Deserialization
Security – JCA and its Principles – Provider Architecture – Engine Class – Key Pair Generation –
Signature Management – Unsecure to Secure Object – Course Summary. [Demos of Secure
Coding in Java]
UNIT-VI Security Standards and Regulations 5 hours
PCI DSS – ISMS -FIPS and NIST Special Publications – FISMA – GDPR – HIPAA – SOX - Conclusion
UNIT-VII Identity Governance and Administration 5 hours
Need for IGA & basics concepts - IGA Basic Concepts and Onboarding - IGA Governance -
Identity Administration in IGA - What next?
Total : 45 Periods
COURSE OUTCOMES
REFERENCE
1 https://infyspringboard.onwingspan.com/en/app/toc/lex_auth_012683751296065536
354_shared/contents (Network Fundamentals)
2 https://infyspringboard.onwingspan.com/en/viewer/html/lex_auth_01350156965715
96809160 (Certified Secure Software Lifecycle Professional (CSSLP) 2019: Secure Coding
Practices)
3 https://infyspringboard.onwingspan.com/en/viewer/html/lex_auth_01350156899275
57129660 (OWASP Top 10: Web Application Security)
4 https://infyspringboard.onwingspan.com/en/viewer/html/lex_auth_01350159304097
792013093 (Defensive coding fundamentals in C and C++)
5 https://infyspringboard.onwingspan.com/en/app/toc/lex_auth_013501581644931072
11192/overview (Security Programming: Python Scripting Essentials)
ONLINE REFERENCE
1 https://www.stealthlabs.com/blog/infographic-top-15-cybersecurity-myths-vs-reality/
2 https://microage.ca/cybersecurity-layering-approach/
3 https://www.oracle.com/java/technologies/javase/seccodeguide.html
4 https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
5 https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-sandboxing/
6 https://www.skillsoft.com/course/security-programming-python-scripting-essentials-be99adad-1f65-4
a4b5-6b5346072b8e
SOFTWARE REQUIREMENT
● Python
● Java script, Node Js
● Java Development kit
HARDWARE REQUIREMENT
● i5 or i7 processor or R5 from AMD
● 16 GB of RAM. 500 GB storage system
INDUSTRY SCOPE
On completion of this course students will be able to identify vulnerability and security
threats in web applications and learn to write secure code. This is extremely crucial, given
the huge volume of digital transactions and web applications.