Cyber Security Syllabus
Cyber Security Syllabus
Cyber Security Syllabus
Prerequisites:
3 0 0 3
Computer Networks & Cryptography & Network Security
Course objectives:
1. To understand various types of cyber-attacks and cyber-crimes
2. To learn threats and risks within context of the cyber security
3. To have an overview of the cyber laws & concepts of cyber forensics
4. To study the defensive techniques against these attacks.
5. To Analyze the Cyber Security needs of the Organizations.
Course Outcomes:
[10 hrs ]
UNIT-II: Cyber offenses: Criminals Plan: Categories of Cybercrime, Cyber Attacks:
Reconnaissance, Passive Attack, Active Attacks, Scanning/Scrutinizing gathered Information,
Attack, Social Engineering: Classification of Social Engineering, Cyberstalking: Types of
Stalkers, Working of Stalking, Real-Life Incident of Cyber stalking, Cybercafe and Cybercrimes,
Botnets: The Fuel for Cybercrime, Botnet, Attack Vector: Theft, viruses, mishing, vishing,
smishing, hacking Bluetooth, Cybercrime and cloud computing.
[12 hrs]
UNIT-III: Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and
Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing
Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security
Implications for Organizations, Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops.
[10 hrs]
UNIT-IV: Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and
Anonymizers, Phishing, Password Cracking, Key loggers and Spywares, Virus and Worms,
Trojan Horses and Backdoors, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer
Overflow, Attacks on Wireless Networks.
[10 hrs]
UNIT-V: Cybercrimes and Cyber security: Organizational Implications–Introduction–Insider
threats, Privacy, Key challenges to organizations, Cost of Cybercrimes and IPR issues, Incident
Handling: Definitions, Why Organizations need Incident Response systems, Examples of
incidents, what organizations can do to protect, best practices for organizations.
TEXT BOOKS:
1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives,
Nina Godbole, SunitBelapure, Wiley India Publications
REFERENCES:
[1] James Graham, R Howard, R Olson, "Cyber Security Essentials" CRC Press, 2018
[2] Michael E Whitman, Herbert J Mattord, "Principles of Information Security", 4th Edition,
Cengage Learning, 2012
[3] William Stallings, “Cryptography and Network Security- Principles and Practice”, 7th Edition,
Pearson Education, 2017