SYLLABUS
SYLLABUS
SYLLABUS
2 0 2 4 4
Pre-requisite NIL Syllabus version
1.0
Objective of the course
1. To introduce system security related incidents and insight on potential defenses, counter
measures against common threat/vulnerabilities.
2. To provide the knowledge of installation, configuration and troubleshooting of information
security devices.
3. To make students familiarize on the tools and common processes in information security
audits and analysis of compromised systems.
Expected Outcome
After successfully completing the course the student should be able to
1. Contribute to managing information security
2. Co-ordinate responses to information security incidents
3. Contribute to information security audits
4. Support teams to prepare for and undergo information security audits
5. Maintain a healthy, safe and secure working environment
6. Provide data/information in standard formats
7. Develop knowledge, skills and competence in information security
Text Book(s)
1. William Stallings, Lawrie Brown, Computer Security: Principles and Practice, 3rd edition,
2. 2014.
Nina Godbole, Information Systems Security: Security Management, Metrics, Frameworks
3. and Best Practices, Wiley, 2017
Nina Godbole, Sunit Belapure, Cyber Security- Understanding cyber-crimes, computer
4. forensics and legal perspectives, Wiley Publications, 2016
Andrew Vladimirov Michajlowski, Konstantin, Andrew A. Vladimirov, Konstantin V.
Gavrilenko, Assessing Information Security: Strategies, Tactics, Logic and Framework, IT
Governance Ltd, O’Reilly, 2010
Reference Books
1. Charles P. Pfleeger, Security in Computing, 4th Edition, Pearson, 2009.
2. Christopher J. Alberts, Audrey J. Dorofee , Managing Information Security Risks, Addison-
Wesley Professional, 2004
3. Peter Zor, The Art of Computer Virus Research and Defense, Pearson Education Ltd, 2005
4. Lee Allen, Kevin Cardwell, Advanced Penetration Testing for Highly-Secured
Environments - Second Edition, PACKT Publishers, 2016
5. Chuck Easttom , System Forensics Investigation and Response, Second Edition, Jones &
Bartlett Learning, 2014
6. David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni, Metasploit The
7 Penetration Tester’s Guide, No Starch Press, 2014
8. Practical Malware Analysis by Michael Sikorski and Andrew Honig, No Starch Press, 2015
9. Ref Links:
https://www.iso.org/isoiec-27001-information-security.html
https://csrc.nist.gov/publications/detail/sp/800-55/rev-1/final
https://www.sans.org/reading-room/whitepapers/threats/paper/34180
https://www.sscnasscom.com/qualification-pack/SSC/Q0901/