Cyber Security & Ethics-28573-CST-7th
About Course
This course is designed as an occupational-specific subject for diploma engineering students to develop foundational knowledge and practical skills in Cyber Security and Ethics. With the increasing reliance on digital systems and networks, understanding cybersecurity principles, ethical considerations, and risk management is essential for IT professionals.
Students will gain the ability to protect computer systems, networks, and data against cyber threats, conduct vulnerability assessments, implement security measures, and apply ethical practices in the cyber world. The course also prepares students for job placement or self-employment in IT and cybersecurity-related fields.
Learning Outcomes
Theoretical Learning Outcomes:
Upon completion of the theory component, students will be able to:
-
Explain types and methodologies of cybersecurity, risk management, and the importance of cybersecurity laws and regulations.
-
Describe computer and internet security, security resources, tools, firewalls, threats, attacks, and data protection techniques.
-
Explain vulnerability assessment and penetration testing (VAPT) methodologies.
-
Describe basics of blockchain technology, data security, and digital forensics.
-
Explain incident response and disaster recovery strategies.
-
Illustrate fundamentals of IT security auditing.
Practical Learning Outcomes:
Upon completion of the practical component, students will be able to:
-
Apply network security, system security, and data security techniques.
-
Perform vulnerability exploitation and post-exploitation techniques.
-
Implement data hiding using steganography and cryptography.
-
Secure application data.
-
Conduct system, mobile, and IoT forensics.
-
Prepare forensic reports.
-
Apply IT governance and auditing management practices.
Detailed Syllabus (Theory)
| Unit | Topics & Contents | Periods | Marks |
|---|---|---|---|
| 1 | Cyber Security & Risk Management: Definition, goals, cyber world structure, types, functional frameworks, risk management framework, basic risk analysis, ethical hacking, cybersecurity laws, user awareness & training | 3 | 10 |
| 2 | System & Network Security: System & network security, computer/network resources, security tools, firewalls, threats, wireless attacks, data protection | 3 | 8 |
| 3 | Vulnerability Assessment & Penetration Testing (VAPT): Definition, types, phases, wireless hacking, hacking tools, log files, CnC, VAPT report | 4 | 10 |
| 4 | Data Security: Data security, database security, privacy, steganography, data hiding, encryption algorithms, digital signatures & certificates, encrypted storage | 5 | 8 |
| 5 | Blockchain Technology: Definition, applications, mining process, security techniques | 3 | 5 |
| 6 | Digital Forensics: Digital crime, classification, forensic investigation processes, file systems, network/cloud/database/malware/mobile forensics, anti-forensics, forensic reports | 6 | 8 |
| 7 | Incident Response & Disaster Recovery: Incident handling, classification, phases, disaster recovery strategy, steps | 4 | 6 |
| 8 | IT Security Auditing: IT audit definition, types, processes, auditing methodology, sampling, reporting | 4 | 5 |
| Total | 32 | 60 |
Detailed Syllabus (Practical)
| Sl | Experiment Name & Procedure | Classes (3 Period) | Marks |
|---|---|---|---|
| 1 | Apply Network Security: Identify tools, configure firewalls, implement wireless security, submit records | 1 | 5 |
| 2 | Apply System Security: Identify tools, system hardening, system commands, host-based security, configure system firewall | 1 | 5 |
| 3 | Apply Basic Data Security: Identify tools, implement strong passwords, encryption, submit records | 1 | 4 |
| 4 | Exploit Vulnerabilities: Identify hacking tools, apply system, wireless, mobile, web server, and web app hacking tools | 2 | 4 |
| 5 | Post-Exploitation Techniques: Review vulnerabilities, disable protections, local assessments, backdoor management, log handling, VAPT report | 3 | 4 |
| 6 | Data Hiding using Steganography: Identify tools, apply streaming media, multilingual steganography | 1 | 4 |
| 7 | Cryptography Techniques: Identify tools, apply digital signatures/certificates, cryptosystems, hash functions | 1 | 4 |
| 8 | Application Data Security: Identify tools, encrypted databases, fix SQL/code injection, apply encrypted network protocols | 1 | 4 |
| 9 | System Forensics: Network log, cloud, database, malware, anti-forensics, OS forensics | 2 | 4 |
| 10 | Mobile & IoT Forensics: Identify tools, mobile forensic process, IoT devices forensics | 1 | 4 |
| 11 | Forensic Report Preparation: Chain-of-custody, expert witness report, maintain legal procedures, final report | 1 | 4 |
| 12 | IT Audit Governance & Management: Identify tools, Business Impact Analysis (BIA), Business Continuity Plan (BCP), IT audit practice | 1 | 4 |
| Total | 16 | 50 |