You are on page 1of 4

Syllabus for Cyber Security

a. Security Policies and Management i. Security Policy Design ii. Designing Security Procedures iii. Risk Assessment Techniques iv. Security standards b. Security Models i. Biba Model ii. Chinese Wall iii. Bell La Pedula Model c. Physical and Environmental Security i. Server Room Design ii. Fire fighting equipment iii. Temperature/humidity Control etc d. Application Security i. Databases, ii. Email and iii. Internet etc e. Communications and Operations Management i. Network Architecture ii. Network Operations iii. Security Devices (Firewalls, IDS/IPS, Antivirus etc) iv. Routers/Switches f. Business Continuity Planning and Management i. Business Impact Analysis ii. Business Continuity/Disaster Recovery Plans g. Access Control i. Logical and ii. Physical Access Control h. Software development, maintenance and support i. Security in development methodology ii. Security testing iii. Segregation of duties CYBER SECURITY Course Contents: Computer Basics- Introduction to Computers, Computer History, Software, Hardware, Classification, Computer Input-Output Devices, Windows, DOS Prompt Commands, Basic Computer Terminology, Internet, Networking, Computer Storage, Cell Phone / Mobile Forensics, Computer Ethics and Application Programs Data and Evidence Recovery- Introduction to Deleted File Recovery, Formatted Partition Recovery, Data Recovery Tools, Data Recovery Procedures and Ethics, Preserve and safely handle original media, Document a "Chain of Custody", Complete time line analysis of computer files based on file creation, file modification and file access, Recover Internet Usage Data, Recover Swap Files/Temporary Files/Cache Files, Introduction to Encase Forensic Edition, Forensic Tool Kit (FTK) etc, Use computer forensics software tools to cross validate findings in computer evidence-related cases. Cyber Crimes - Introduction to IT laws & Cyber Crimes Internet, Hacking, Cracking, Viruses, Virus Attacks, Pornography, Software Piracy, Intellectual property, Legal System of Information Technology, Social Engineering, Mail Bombs, Bug Exploits, and Cyber Security etc. Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption methods, Search and Seizure of Computers, Recovering deleted evidences, Password Cracking. Cyber SecurityIntroduction to Cyber Security, Implementing Hardware Based Security, Software Based Firewalls, Security Standards, Assessing Threat Levels, Forming an Incident Response

Team, Reporting Cyber crime, Operating System Attacks, Application Attacks, Reverse Engineering & Cracking Techniques and Financial Frauds.

Module I: Networking Concepts Overview Lesson 1: Basics of Communication Systems Lesson 2: Transmission Media Lesson 3: ISO/OSI and TCP/IP Protocol Stacks Lesson 4: Local Area Networks Lesson 5: Wide Area Networks Lesson6 : Internetworking Lesson7 : Packet Formats Lesson8 : Wireless Networks Lesson9 : The Internet Module 2: Information Security Concepts Lesson1 : Information Security Overview Lesson2 : Information Security Services Lesson3 : Types of Attacks Lesson4 : Goals for Security Lesson5 : E-commerce Security Lesson6 : Computer Forensics Lesson7 : Steganography Lesson8 : Security Engineering Module 3: Security Threats and vulnerabilities Lesson1 : Overview of Security threats Lesson2 : Hacking Techniques Lesson3 : Password Cracking Lesson4 : Insecure Network connections Lesson5 : Malicious Code Lesson6 : Programming Bugs Lesson7 : Cyber crime and Cyber terrorism Lesson8 : Information Warfare and Surveillance Module 4: Cryptography Lesson1 : Introduction to Cryptography Lesson2 : Symmetric key Cryptography Lesson3 : Asymmetric key Cryptography Lesson4 : Message Authentication and Hash functions Lesson5 : Digital Signatures Lesson6 : Public Key infrastructure Lesson7 : Diffe-Hellman key exchange proptocol Lesson8 : Applications of Cryptography
Unit 2: Security Management

ModuleI: Security Management Practices Lesson 1: Overview of Security Management Lesson 2: Information Classification Process Lesson 3: Security Policy Lesson 4: Risk Management Lesson 5: Security Procedures and Guidelines Lesson 6: Business Continuity and Disa ster Recovery Module2: Security Laws and Standards Lesson 1: Security Assurance Lesson 2: Security Laws Lesson 3: International Standards Lesson 4: Security Audit Lesson 5: OCTAVE approach

You might also like