Cyber Security

Cyber Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term Security implies Cyber Security.

Unit 1: Security Concepts and Mechanisms
    Module I: Networking Concepts Overview
        1: Basics of Communication Systems
        2: Transmission Media
        3: ISO/OSI and TCP/IP Protocol Stacks
        4: Local Area Networks
        5: Wide Area Networks
        6 : Internetworking
        7 : Packet Formats
        8 : Wireless Networks
        9 : The Internet
     Module 2: Information Security Concepts
        1 : Information Security Overview
        2 : Information Security Services
        3 : Types of Attacks
        4 : Goals for Security
        5 : E-commerce Security
        6 : Computer Forensics
        7 : Steganography
        8 : Security Engineering
     Module 3: Security Threats and vulnerabilities
        1 : Overview of Security threats
        2 : Hacking Techniques
        3 : Password Cracking
        4 : Insecure Network connections
        5 : Malicious Code
        6 : Programming Bugs
        7 : Cyber crime and Cyber terrorism
        8 : Information Warfare and Surveillance
    Module 4: Cryptography
        1 : Introduction to Cryptography
        2 : Symmetric key Cryptography
        3 : Asymmetric key Cryptography
        4 : Message Authentication and Hash functions
        5 : Digital Signatures
        6 : Public Key infrastructure
        7 : Diffe-Hellman key exchange proptocol
        8 : Applications of Cryptography

Unit 2: Security Management
    ModuleI: Security Management Practices
        1: Overview of Security Management
        2: Information Classification Process
        3: Security Policy
        4: Risk Management
        5: Security Procedures and Guidelines
        6: Business Continuity and Disa ster Recovery
    Module2: Security Laws and Standards
        1: Security Assurance
        2: Security Laws
        3: International Standards
        4: Security Audit
        5: OCTAVE approach
        6: SSE-CMM Unit 3:


Unit 3: Network Security
    Module 1: Access Control and Intrusion Detection
        1: Overview of Identification and Authorization
        2: I & A Techniques
        3: Overview of IDS
        4: Intrusion Detection Systems and Intrusion Prevention Systems
    Module 2: Server Management and Firewalls
        1: User Management
        2: DNS Routing and Load Balancing
        3: Overview of Firewalls
        4: Types of Firewalls
        5: DMZ and firewall features
    Module 3: Security for VPN and Next Generation Networks
        1: VPN Security
        2: Security in Multimedia Networks
        3: Fax Security
        4: Link Encryption Devices

Unit 4: System and Application Security
    Module 1: Security Architectures and Models
        1:Desiging Secure Operating Systems
        2: Controls to enforce security services
        3: Information flow model and Biba model
    Module 2: System Security
        1: Desktop Security
        2: email security: PGP and SMIME
        3: Web Security: web authentication, SSL and SET
    Module 3: OS Security
        1: OS Security Vulnerabilities, updates and patches
        2: OS integrity checks
        3: Anti-virus software
        4: Design of secure OS and OS hardening
        5: Configuring the OS for security  6: Trusted OS


Last modified: Sunday, 17 July 2016, 11:32 PM