0% found this document useful (0 votes)
9 views

PECS-621C Cyber Security

theory syllabus of cyber security

Uploaded by

Ankush
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

PECS-621C Cyber Security

theory syllabus of cyber security

Uploaded by

Ankush
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Title of the course : Cyber Security

Subject Code : PECS-621C


Weekly load : 3 Hrs LTP 3-0-0
Credit :3

Course Outcomes: At the end of the course, the student will be able to:
CO1 Gain knowledge of cyber threats and vulnerabilities.
CO2 Analyze and resolve security issues in networks to secure an IT infrastructure.
CO3 Learn about hijacking and its control measures.
CO4 Understand cyber crime and its related attacks.
CO5 To understand the concept of intrusion and system hardening.

CO/PO Mapping : (Strong(3)/Medium(2)/Weak(1) indicates strength of correlation):


Program Outcomes (PO's)/ Program Specific Outcomes (PSO's)
Cos
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 0 3 1 3 2 0 0 3 1 3 2 1 2
CO2 3 3 3 3 3 0 0 0 3 1 3 2 2 3
CO3 3 0 3 0 0 0 0 0 0 0 0 2 1 1
CO4 3 0 3 3 0 0 0 0 0 0 0 3 1 1
CO5 3 2 3 1 0 0 0 1 0 0 1 2 1 1
Theory
Unit Main Topics Course outlines Lecture(s)
1. Threats Overview of Cyber threats, Network vulnerabilities and its
&Network types, Networks Vulnerability Scanning (Netcat, Socat),
Vulnerabilit Network Sniffers and Injection tools 06
ies
Cyber Security Framework NIST
2. Network Firewalls: Firewall Basics, How a Firewall Protects a Network,
Security Firewall types: Stateless and Stateful Firewalls, Network
Fundament Address Translation (NAT) and Port Forwarding, WAF (Web
als Application Firewall)
10
VPN: the basic of Virtual Private Networks
Snort: Intrusion Detection System, Cyber Kill Chain model for
identification and prevention of cyber intrusions activity
Proxy: Types of proxy and its architecture
3. Hijacking Control Hijacking, More Control Hijacking attacks integer
overflow, attacks format string vulnerabilities, Defense against
Control Hijacking – Platform Defenses, Defense against Control 08
Hijacking - Run-time Defenses, Advanced Control Hijacking
attacks.
4. Cyber Introduction to cybercrime, Data diddling, Data leakage,
Crime Eavesdropping, E-mail forgery, E-mail threats, Internet
misinformation, Internet terrorism, Password cracking,
Unit-2 Scavenging/Corporate Espionage, Social Engineering, 08
Spamming, Super zapping, Piggybacking, Trap door, Trojan
Horse, Virus, Worm Impersonation, Time bomb, Logic bomb,
DOS Attack Email Hacking & its security, Social Media
Hacking & its Security, Web Hacking& its Security, Mobile
Hacking & its Security, Wi-Fi Network Hacking & its Security,
Software Hacking, Email forgery and E-mail Tracing.
5. Intrusion Intrusion Analysis, Intrusion, Methods to Performing Intrusion
Analysis, Passively, Discovering Activity in Historical Data and
Logs, Detecting Future Threat Actions and Capabilities,
08
Denying Access to Threats, Delaying and Degrading Adversary
Tactics and Malware, Identifying Intrusion Patterns and Key
Indicators
6. System Concepts and Processes of OS and NOS Hardening, File System,
Hardening Updates, Hotfixes, Service Packs, Patches.
Network Hardening, Updates (Firmware), Configuration,
Enabling and Disabling Services and Protocols, Access Control 08
Lists.
Application Hardening, Web Servers, E-mail Servers, FTP
Servers, DNS Servers, NNTP Servers, File and Print Servers,
DHCP, Data Repositories, Directory Services, Databases.
Total=48

Recommended Books:
1. Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short, Cybersecurity essential,
Sybex, Wiley Press
2. Anne Kohnke, Dan Shoemaker, Ken Sigler, The Complete Guide to Cybersecurity Risks and
Controls, CRC press
3. Thomas J. Mowbray, Cybersecurity - Managing Systems, Conducting Testing, and
Investigating Intrusions, Wiley press
4. Leslie F. Sikos, AI in Cybersecurity, Springer

You might also like