Professional Documents
Culture Documents
Alliance College of Engineering and Design
Alliance College of Engineering and Design
Alliance College of Engineering and Design
Chikkahagade Cross
Chandapura - Anekal Main Road, Anekal
Bangalore – 562106
Course Code: CSCS 441 Course Title: Fundamentals of Cyber Security Credits: 3
Pre-requisites:
INSTRUCTOR Dr. Chetan shelke
Office: OF12 Office of Faculty
OFFICE HOURS 9:00AM to 4:00PM Monday to Friday
In this Fundamental of Cyber security, you will be given an extensive overview of the various
COURSE
branches of computing security. You will learn cybersecurity concepts, issues, and tools that are
OVERVIEW:
critical in solving problems in the computing security domain.
You will have opportunities to learn essential techniques in protecting systems and network
infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing
security solutions for organizations large or small.
This course will enable the students to:
COURSE 1. Exhibit knowledge to secure corrupted systems, protect personal data, and secure computer
OBJECTIVES: networks in an organization.
2. Practice with an expertise in academics to design and implement security solutions.
3. Understand key terms and concepts in Cryptography, Governance and Compliance.
4. Develop cyber security strategies and policies
Understand principles of web security and to guarantee a secure network by monitoring and
analyzing the nature of attacks through cyber/computer forensics software/tools.
PROGRAM
EDUCATIONAL The Program Educational Objectives of the department of Information Technology are
OBJECTIVES such that when the students graduate, they will be able to:
(PEO) PEO1:The graduates of Information Technology will have successful technical or
professional careers in project management and leadership roles.
PEO2: Graduates of the Information Technology will continue to learn and to
adapt in a world of constantly evolving technology in reputed institutions across
the country.
PEO3: Become successful entrepreneur to serve for the society with ethical and
social values.
PO 5: Modern tool usage: Create, select, and apply appropriate techniques, resources,
and modern engineering and IT tools including prediction and modelling to complex
engineering activities with an understanding of the limitations.
PO 6: The engineer and society: Apply reasoning informed by the contextual knowledge
to assess societal, health, safety, legal and cultural issues, and the consequent
responsibilities relevant to the professional engineering practice.
PO 12: Life-long learning: Recognize the need for, and have the preparation and ability
to engage in
independent and life-long learning in the broadest context of technological change.
PROGRAM
SPECIFIC PSO1: Ability to develop computer programs in the area related to algorithms, web
OUTCOMES design and Data Analytics.
(PSO) PSO2: Acquire professional skill set of software design process in software project
development using open-source technologies.
(Dept/Spl-
Specific) PSO3: Provide effective and efficient real time IT solutions using acquired knowledge in
2
various domains.
3
1 DSA During 20 As per
Semester calendar
Exam
2 CP Class 5 Throughout
Participation the semester
1 CO-1 2
2 CO-2 2 2 2 3
3 CO-3 3 2 2 2 3 3 2 1 2 3 2
4 CO-4 3 3 3 3 2 1 3 3 3 2 1 2 3 2 2
5 CO-5 3 3 3 3 2 3 3 3 2 2 2 3 2 2 3
2 Class Participation/
How Internet Implementation of the
Cyber Fraud Works - Class presentation security algorithms
Stalking, Identity
CO2 Demonstration assigned/
Fraud, and Theft ,Cyber
10-18
Abuse Stalking , Surprise test/
BTL2 With hands-on
Protecting
Assignment /MSE1
against Cyber
Crime ,Denial of
Service Attacks ,
DoS Weaknesses
3. Trojan Class
Horses ,The Participation/Analyzin
Malware - Buffer-Overflow Class presentation g and implementation
Viruses Attack,Other of port scanning/
Demonstration
Forms of Surprise test/
Malware ,Detecti With hands-on Assignment /MSE1
CO3 ng and
19-27 Eliminating
BTL2 Viruses and
Spyware ,
Techniques Used
by Hackers , The
Reconnaissance
Phase - Actual
Attacks
Textbook1:
RECOMMENDED READINGS:
Essential Readings:
6
Text Books:
Chuck Easttom, “Computer Security Fundamentals” Second edition, Pearson education, 2012
Reference Books:
1. Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short, “Cyber Security Essentials, Wiley publication
2. Erdal Ozkaya, “Cybersecurity: the Beginner's Guide”, Packet publication 2019.
Additional Readings:
E-Book:
https://uou.ac.in/sites/default/files/slm/Introduction-cyber-security.pdf
SignatureoftheCourseInstructorHOD
CP(Class Criteria
Participation)
Grade Exemplary Proficient Partially Need
proficient improvement
Marks 5 4 3 2
Level of engagement Student Student Student listens Student listens
in class participate in all listens and and contributes but never
classroom proactively to class by participate in
activities and contributes sharing ideas or class by sharing
proactively to class by clearing doubts ideas or clearing
contributes to sharing ideas rarely doubts
class by sharing or clearing
ideas or clearing doubts.
doubts in every
session
Preparation Student is always Student is Student is Student is seldom
prepared with usually partially prepared with
given reading prepared prepared with given reading
materials and with given given reading materials and
complete the reading materials and complete the
assigned works materials and complete the assigned work
complete the assigned works
assigned
works
OT(Mini Project) Students self Students may Students Students may not
motivated to work on the complete the complete the
work on mini assigned assigned work assigned task as a
projects relevant topics as with many mini project in
to the course mini project reminders time
with the and give the
deliverables result
Problem Solving Students actively Students Students does Students does not
7
seeks and improves not come up try to solve
suggests solutions with solutions problems or help
solutions to based on but tries out others to solve
problems suggestions solutions problems
by peer suggested by
others
Teamwork Motivate the Assisted Finished Contributed little
team members to group/partner individual task to the group effort
contributed in the but did not during the
equally to finished assist project.
complete the project. group/partner
group during the
assignments project
AS(Assignment) Detailed answer Detailed Explanation Incorrectly
given with no answer given unclear, but formatted answer
errors and but final answer shows and the response
validated output may some is not aligned to
not be understanding problem
correct of the problem
Dr. Chetan S.
Signature of the Course Instructor HOD