Cyber Security & Ethics-28573-CST-7th

Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

This course is designed as an occupational-specific subject for diploma engineering students to develop foundational knowledge and practical skills in Cyber Security and Ethics. With the increasing reliance on digital systems and networks, understanding cybersecurity principles, ethical considerations, and risk management is essential for IT professionals.

Students will gain the ability to protect computer systems, networks, and data against cyber threats, conduct vulnerability assessments, implement security measures, and apply ethical practices in the cyber world. The course also prepares students for job placement or self-employment in IT and cybersecurity-related fields.


Learning Outcomes

Theoretical Learning Outcomes:

Upon completion of the theory component, students will be able to:

  1. Explain types and methodologies of cybersecurity, risk management, and the importance of cybersecurity laws and regulations.

  2. Describe computer and internet security, security resources, tools, firewalls, threats, attacks, and data protection techniques.

  3. Explain vulnerability assessment and penetration testing (VAPT) methodologies.

  4. Describe basics of blockchain technology, data security, and digital forensics.

  5. Explain incident response and disaster recovery strategies.

  6. Illustrate fundamentals of IT security auditing.

Practical Learning Outcomes:

Upon completion of the practical component, students will be able to:

  1. Apply network security, system security, and data security techniques.

  2. Perform vulnerability exploitation and post-exploitation techniques.

  3. Implement data hiding using steganography and cryptography.

  4. Secure application data.

  5. Conduct system, mobile, and IoT forensics.

  6. Prepare forensic reports.

  7. Apply IT governance and auditing management practices.


Detailed Syllabus (Theory)

Unit Topics & Contents Periods Marks
1 Cyber Security & Risk Management: Definition, goals, cyber world structure, types, functional frameworks, risk management framework, basic risk analysis, ethical hacking, cybersecurity laws, user awareness & training 3 10
2 System & Network Security: System & network security, computer/network resources, security tools, firewalls, threats, wireless attacks, data protection 3 8
3 Vulnerability Assessment & Penetration Testing (VAPT): Definition, types, phases, wireless hacking, hacking tools, log files, CnC, VAPT report 4 10
4 Data Security: Data security, database security, privacy, steganography, data hiding, encryption algorithms, digital signatures & certificates, encrypted storage 5 8
5 Blockchain Technology: Definition, applications, mining process, security techniques 3 5
6 Digital Forensics: Digital crime, classification, forensic investigation processes, file systems, network/cloud/database/malware/mobile forensics, anti-forensics, forensic reports 6 8
7 Incident Response & Disaster Recovery: Incident handling, classification, phases, disaster recovery strategy, steps 4 6
8 IT Security Auditing: IT audit definition, types, processes, auditing methodology, sampling, reporting 4 5
Total   32 60

Detailed Syllabus (Practical)

Sl Experiment Name & Procedure Classes (3 Period) Marks
1 Apply Network Security: Identify tools, configure firewalls, implement wireless security, submit records 1 5
2 Apply System Security: Identify tools, system hardening, system commands, host-based security, configure system firewall 1 5
3 Apply Basic Data Security: Identify tools, implement strong passwords, encryption, submit records 1 4
4 Exploit Vulnerabilities: Identify hacking tools, apply system, wireless, mobile, web server, and web app hacking tools 2 4
5 Post-Exploitation Techniques: Review vulnerabilities, disable protections, local assessments, backdoor management, log handling, VAPT report 3 4
6 Data Hiding using Steganography: Identify tools, apply streaming media, multilingual steganography 1 4
7 Cryptography Techniques: Identify tools, apply digital signatures/certificates, cryptosystems, hash functions 1 4
8 Application Data Security: Identify tools, encrypted databases, fix SQL/code injection, apply encrypted network protocols 1 4
9 System Forensics: Network log, cloud, database, malware, anti-forensics, OS forensics 2 4
10 Mobile & IoT Forensics: Identify tools, mobile forensic process, IoT devices forensics 1 4
11 Forensic Report Preparation: Chain-of-custody, expert witness report, maintain legal procedures, final report 1 4
12 IT Audit Governance & Management: Identify tools, Business Impact Analysis (BIA), Business Continuity Plan (BCP), IT audit practice 1 4
Total   16 50
Show More

Course Content

1 Cyber Security and Risk Management
1.1 Define cyber security & goal of cyber security 1.2 Interpret cyber security & risk management 1.3 Explain structure of cyber world 1.4 Illustrate type of cyber security 1.5 Explain functional framework of cyber security 1.6 Describe risk management framework 1.7 Illustrate basic risk analysis methodology & risk mitigation process 1.8 Illustrate ethical hacking 1.9 Interpret importance of cyber security laws & rules 1.10 Explain user awareness and training for cyber security

2 System and Network Security
2.1 State system and network security 2.2 Describe computer, network & internet security resources 2.3 Explain the use of security tools 2.4 Define firewall & state the types of firewall 2.5 Define threat and mention types of threat 2.6 Illustrate wireless attack & attacks on different layer 2.7 Illustrate basic data security and securing data storage system

3 Vulnerability Assessment and Penetration Testing
3.1 Define vulnerability assessment and penetration testing (VAPT) 3.2 Describe types of vulnerability scanning & penetration testing 3.3 explain penetration testing phases and techniques 3.4 Illustrate wireless hacking and different types of hacking tools 3.5 Explain log files and command & control Centre (CnC) 3.6 State VAPT report

4 Data Security
4.1 Define data security, database security and data privacy 4.2 Illustrate different types of steganography 4.3 Describe various data hiding techniques 4.4 Explain steganography and steganography algorithms 4.5 Explain data encryption algorithms and techniques 4.6 Explain encrypted data storage technique is used in databases 4.7 Illustrate digital signatures and digital certificates techniques

5 Blockchain Technology
5.1 State blockchain & blockchain technology 5.2 Mention application field of blockchain technology 5.3 Explain blockchain mining process 5.4 Describe blockchain security techniques

6 Digital Forensics
6.1 Define digital crime 6.2 Mention the classification of digital crime 6 8 6.3 Illustrate digital forensic and digital forensic investigation processes 6.4 State the type of file system and file carving techniques 6.5 Describe the techniques of network log forensic, cloud forensic techniques, database forensic techniques, network log forensic technique, cloud forensic techniques, malware forensic and mobile forensic. 6.6 Explain defeating anti-forensic techniques is applied. 6.7 Describe forensic investigation report

7 Incidents Response and Disaster Recovery
7.1 Define incident handling and disaster recovery 7.2 Describe the classification of incident elements handling process 7.3 Explain phases of incident handling 7.4 Illustrate disaster recovery strategy and policy 7.5 Explain steps of disaster recovery

8 IT Security Auditing
8.1 Define it audit 8.2 Describe types of it audit 8.3 Explain the process of auditing information systems 8.4 Explain the processes of it auditing 8.5 Explain it audit sampling methodology 8.6 Describe it audit reporting process

Student Ratings & Reviews

No Review Yet
No Review Yet
Scroll to Top