B.TECH. CSE with Specialization in Cyber Security and Hacking



Similar documents
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Detailed Description about course module wise:

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Cryptography and network security CNET4523

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

CYBERTRON NETWORK SOLUTIONS

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

CRYPTOGRAPHY AND NETWORK SECURITY

A Systems Engineering Approach to Developing Cyber Security Professionals

Networking: EC Council Network Security Administrator NSA

Network Security Essentials:

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Weighted Total Mark. Weighted Exam Mark

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

e-code Academy Information Security Diploma Training Discerption

CEH Version8 Course Outline

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Description: Objective: Attending students will learn:

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Certified Ethical Hacker (CEH)

CRYPTUS DIPLOMA IN IT SECURITY

NETWORK ADMINISTRATION AND SECURITY

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

CS 5490/6490: Network Security Fall 2015

Introduction to Cyber Security / Information Security

Certified Ethical Hacker Exam Version Comparison. Version Comparison

FORBIDDEN - Ethical Hacking Workshop Duration

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

BUY ONLINE FROM:

Security + Certification (ITSY 1076) Syllabus

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ethical Hacking Course Layout

Chapter 7 Transport-Level Security

Diploma in Information Security Control, Audit and Management (CISSP Certification)

The Information Security Problem

CRYPTOG NETWORK SECURITY

Certified Cyber Security Analyst VS-1160

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Build Your Own Security Lab

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Eleventh Hour Security+

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

How To Pass A Credit Course At Florida State College At Jacksonville

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Bellevue University Cybersecurity Programs & Courses

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

Loophole+ with Ethical Hacking and Penetration Testing

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Chapter 8. Network Security

Network Security Administrator

Security Goals Services

Certified Cyber Security Analyst VS-1160

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

LINUX / INFORMATION SECURITY

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Content Teaching Academy at James Madison University

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

[CEH]: Ethical Hacking and Countermeasures

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

VALLIAMMAI ENGINEERING COLLEGE

Security vulnerabilities in the Internet and possible solutions

CS5008: Internet Computing

Network Security Fundamentals

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Principles of Information Assurance Syllabus

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Jort Kollerie SonicWALL

SCP - Strategic Infrastructure Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

CS Final Exam

GSEC GIAC Security. Essentials Certification ONE ALL IN EXAM GUIDE. Ric Messier. Singapore Sydney Toronto

CompTIA Security+ (Exam SY0-410)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Fundamentals of Network Security - Theory and Practice-

Künftige Cyber-Attacken: Risiken und Techniken. Future Cyber attacks: Risks and techniques. Prof. Dr. T. Nouri sd&m

Chapter 1 The Principles of Auditing 1

EC Council Certified Ethical Hacker V8

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

How To Protect Your Data From Attack

Transcription:

B.TECH. CSE with Specialization in Cyber Security and Hacking Departmental Elective-I Information Security Fundamental(BCS 048) Departmental Elective-II Concepts of Ethical Hacking (BCS 058) Departmental Elective-III Physical Security(BCS 068) Departmental Elective-IV Data Security (BCS 077) Open Elective Network Management(BOE 077) Departmental Elective-V I T Network Security (BCS 087) Departmental Elective-VI Planning (BCS 091) I T Business Continuity and Disaster Recovery

Department Elective-1 BCS-048 Information Security Fundamental Unit 1 Security concepts: data threats, distinguish between data and information, cyber crime, difference between hacking and cracking and ethical hacking, recognize threats to data from force majeure like: fire, floods, war, earthquake, recognize threats to data from: employees, service providers and external individuals Unit 2 Value of information: understand the reasons for protecting personal information like: avoiding identity, theft, fraud, reason for protecting commercially sensitive information like preventing theft or miss use of client details financial information,encryption,password, confidentiality,integrity availability identify data protection, retention and control requirement in your country Unit 3 Personal security: understand the terms social engineering and it implication like information gathering,fraud computer system access identify method of social engineering like phone call, phishing, shoulder surfing identify theft and it applications personal, financial businesses legal identify method of identity theft like, information diving,skimming pretexting Unit 4 File security: enabling/disabling macro security settings, seta password for files link: documents, compressed files, spreadsheets, understand the advantage and limitation of encryption Unit 5 Malware: Definition and function types of protection, Networks: networks types, function and limitation of a firewall References: 1. William Stallings, Cryptography and Network Security Principles and Practice, 5th Edition, Pearson, 2013 2. Behrouz A Forouzan and Debdeep Mukhopadhyay, Cryptography and Network Security, 2nd Edition, Mc Graw Hill, 2007 3. Atul Kahate, Cryptography and Network Security, 2nd Edition, Mc graw Hill, 2007

L T P Unit I Department Elective-II BCS-058 Concepts of Ethical Hacking Credit-4 Ethical Hacking: Introduction, Networking & Basics, Foot Printing, Google Hacking, Scanning, Windows Hacking, Linux Hacking, Trojans & Backdoors, Virus & Worms, Proxy & Packet Filtering, Denial of Service, Sniffer, Social Engineering, Unit II Introduction to Computer Systems and Networks, information systems and networks (including wireless networks) and their role in industry business and society, System and Network Vulnerability and Threats to Security, various types of attack and the various types of attackers in the context of the vulnerabilities associated with computer and information systems and networks. Unit III Physical Security, Steganography, Cryptography, Wireless Hacking, Firewall & Honey pots, IDS & IPS, Vulnerability, Penetration Testing, Session Hijacking, Hacking Web Servers, SQL Injection, Cross Site Scripting, Exploit Writing, Buffer Overflow, Reverse Engineering, Email Hacking, Incident Handling & Response, Bluetooth Hacking, Mobile s Phone Hacking Unit IV An introduction to basic ethical hacking tools and usage of these tools in a professional environment in a form of project Unit V An introduction to the particular legal, professional and ethical issues likely to face the domain of ethical hacking, Ethical responsibilities, professional integrity and making appropriate use of the tools and techniques associated with ethical hacking. Reference Books: 1. Hands On Ethical Hacking and Network Defense By Michael T. Simpson, Kent Backman, James Corley 2. Official Certified Ethical Hacker Review Guide By Steven De Fino, Barry Kaufman, Nick Valenteen. 3. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy(Syngress Basics Series)[Paperback] 4. Hands On Ethical Hacking and Network Defense[Print Replica] [Kindle Edition

Departmental Elective-III BCS -068 Physical Security UNIT I Introduction: Physical Protections and attacks, locks and safes, Authentication technologies, Direct attacks against computer, special purpose machines physical intrusion detection. Need of physical security, physical security, physical security of information system resources, Physical entry controls Operating System Security: Operating system concepts, process security, memory and file system security, Application program Network Security-I: Network Security concepts, the data link layer, network layer, transport layer, denial of service Attacks. Network Security-II: Application layer and DNS, firewalls, tunneling, intrusion detection wireless networking. UNIT-V Security models: Access control models administration and auditing, Kerberos, secure storage. Biometrics controls for security: biometrics based security issues and challenges, classification of biometrics applications, architectural and design issues in biometrics systems References Books: 1. Network Security Essentials: Application and standards, 4th Edition, William Stalling, Prentice Hall, 2011 2. Nina Godbole.2011 Information systems security security management, metrics, frameworks and best practices: Wiley 3. William Stallings, Cryptography and Network Security Principles and Practice, 5th Edition, Pearson, 2013 4. Behrouz A Forouzan and Debdeep Mukhopadhyay, Cryptography and Network Security, 2nd Edition, Mc Graw Hill, 2007 5. Atul Kahate, Cryptography and Network Security, 2nd Edition, Mc graw Hill, 2007

Departmental Elective-IV BCS-077: I T Data Security UNIT-I Introduction: Fundamental Concepts of data security, Access control models, cryptographic concepts, and implementation and usability issues. Cryptography: Symmetric cryptography, Public Key Cryptography, Cryptographic Hash Functions, Digital Signatures, details on AES and RSA. Malware: Attacks, Computer viruses, Malware attacks privacy invasive software, counter measures. Distributed application security: Data base security, E mail security, Payment systems and Auctions digital rights management, Social networking security References Books: 1. Network Security Essentials: Application and standards, 4th Edition, William Stalling, Prentice Hall, 2011 2. Nina Godbole.2011 Information systems security security management, metrics, frameworks and best practices: Wiley

Open Elective BOE- 077: Network Management UNIT-I Introduction-Network management architecture and organization-network Management standards- Network Management Models -SNMP protocol - SNMP model- SNMP V1-SNMP V1 communication and functional model SNMP V2: system architecture- Structure of management information- Management Information Base- protocol-compatibility with SNMP V1.SNMP V3: key features-architectureapplications- Management Information Base-Security-User based security model-access control Remote Monitoring: RMON SMI and MIB-RMON1-RMON2-ATM remote monitoring Network management tools, system and Engineering:-System Utilities for management-network statistics measurement system- MIB Engineering -NMS design TMN: Operating Systems- Conceptual model-standards-architecture- Management service architecture- Implementation Network Management Applications: Network Configuration Management- Fault Management - Performance Management - Security Management-Accounting Management Report Management-Policy based management-service level management Broadband Network management: ATM network management - MPLS OAM engagement Optical and man feeder networks-broadband access network-cable access network management DOCSIS network - DSL access network - ADSL managment-adsl2,adsl2+ and VDSL2- Passive Optical Network management. Ethernet management-802.11 Networks management CORBA based NM technology-xml based NM technology -Comparison of NM technologies- NM related standards. References: 1. Mani Subrahmanian, Network Management Principles and Practice, 2nd edition, Pearson Education, 2010 2. Stephen B. Morris, Network Management, MIBs and MPLS, Prentice Hall, 2003. 3. Jianguo Ding, Advances in Network Management,CRC Press, 2010.

Departmental Elective-V BCS- 087: I T Network Security UNIT-I Introduction: Motivating examples, Basic concepts: confidentiality, integrity, availability, security policies, Security mechanisms, assurance, Basic Cryptography: Historical background Transposition/Substitution, Caesar Cipher Introduction to Symmetric crypto primitives, Asymmetric crypto Primitives and Hash functions Secret Key Cryptography: Applications, Data Encryption Standard (DES), Encrypting large messages (ECB, CBC, OFB, CFB, CTR), Multiple Encryption DES (EDE) Message digests: Applications, Strong and weak collision resistance, The Birthday Paradox, MD5, SHA-1 Public Key Cryptography: Applications, Theory: Euclidean algorithm, Euler Theorem, Fermat Theorem, Totent functions, multiplicative and additive inverse, RSA, Selection of public and private keys Authentication: Security Handshake pitfalls, online vs. offline password guessing, Reflection attacks, Per-session keys and authentication tickets, Key distribution centers and certificate authorities Trusted Intermediaries: Public Key infrastructures, Certification authorities and key distribution centers, Kerberos Real-time Communication Security: Introduction to TCP/IP protocol stack, Implementation layers for security protocols and implications I P sec: AH and ESP, I P sec: IKE, SSL/TLS UNIT-V Electronic Mail Security: Distribution lists, Establishing keys, Privacy, source authentication, message integrity, non-repudiation, Proof of submission, proof of delivery, message flow confidentiality, anonymity, Pretty Good Privacy (PGP) Firewalls and Web Security: Packet filters, Application level gateways, Encrypted tunnels, Cookies, Web security problems References: 1. Network Security Essentials: Application and standards, 4th Edition, William

Stalling, Prentice Hall, 2011 2. William Stallings, Cryptography and Network Security Principles and Practice, 5th Edition, Pearson, 2013 3. Behrouz A Forouzan and Debdeep Mukhopadhyay, Cryptography and Network Security, 2nd Edition, Mc Graw Hill, 2007 4. Atul Kahate, Cryptography and Network Security, 2nd Edition, Mc graw Hill, 2007

Departmental Elective-VI BCS-091: I T Business Continuity and Disaster Recovery Planning UNIT-I Introduction: Genesis of DRP, importance of BCP, business impact analysis, approaches to DRP, defining business goals to prepare for BCP and DRP, DRP test types, identification of key personnel, business interruptions preparedness checklist, business resilience Auditing for security: Basic term related to audits, security audits, need for security audits in organizations, organizational roles and responsibilities for security audit, types of security audits, approaches to audits, phases in security audits, budgeting for security audits Privacy best practices in organizations: Privacy organizational implications, privacy audits- driving factors, privacy practices, privacy auditing standards and privacy audits phases, privacy impact assessment of information systems applications, organizational reactions to privacy audits Asset management: understanding the organizational context for asset management, security aspects in IT asset management s, asset management in organizations issues and challenges, asset management life cycle, benefits of asset management, role and responsibilities, managing software assets UNIT-V Ethical issues and intellectual property concerns: information system, characteristics of inside attacks on organizational information systems, natural of ethical issues in the networked enterprise, implications for the healthcare industry ethical and legal concerns, data auctioning, data hijacking and data laundering, ethical issues owing to information warfare, understanding ethical hacking, social engineering issues References books: 1. Hiles, A. (ed.) 2011. The Definitive Handbook of Business Continuity Management (3rd ed.). West Sussex, UK: Wiley. 2. Nina Godbole.2011 Information systems security security management, metrics, frameworks and best practices: Wiley