Professional Documents
Culture Documents
Handson Syllabus CSCS 441-Fundamentals of Cyber Security.
Handson Syllabus CSCS 441-Fundamentals of Cyber Security.
Handson Syllabus CSCS 441-Fundamentals of Cyber Security.
ASSESSMENT SCHEME
Semester End
During Semester Assessment (DSA)
Examination
In this Fundamental of Cyber security, you will be given an extensive overview of the various branches of computing
security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing
Course security domain.
Description You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing
and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or
small.
1. Exhibit knowledge to secure corrupted systems, protect personal data, and secure computer networks in an
organization.
2. Practice with an expertise in academics to design and implement security solutions.
Course
3. Understand key terms and concepts in Cryptography, Governance and Compliance.
Objective
4. Develop cyber security strategies and policies
5. Understand principles of web security and to guarantee a secure network by monitoring and analyzing the nature
of attacks through cyber/computer forensics software/tools.
Upon completion of this course, the students will be able to
1. Analyze and evaluate the cyber security needs of an organization.
2. Determine and analyze software vulnerabilities and security solutions to reduce the risk of exploitation.
Course 3. Measure the performance and troubleshoot cyber security systems.
Outcome 4. Implement cyber security solutions and use of cyber security, information assurance, and cyber/computer forensics
software/tools.
5. Comprehend and execute risk management processes, risk treatment methods, and key risk and performance
indicators.
Prerequisites:
CO-2 2 3 2 - - 2 2 - - - - - - - -
CO-3 2 3 2 - 3 2 2 - - 2 - - 1 - -
CO-4 2 3 2 2 3 3 2 - 2 2 2 3 2 2 2
CO-5 2 2 2 3 3 3 2 2 2 3 2 3 2 2 2
How Seriously Should You Take Threats to Network Security? - Identifying Types of Threats - Assessing the
Likelihood of an Attack on Your Network - Networks and the Internet - Network Basics - How the internet Works -
History of the Internet - Basic Network Utilities – Other Network Devices - Advanced Network Communications CO-1
Topics
Hands ON: Network Interfaces on the Kali Linux, Identify the Network Routes in the System ,DNS Lookup and
reverse lookup
Network Analysis using tcpdump
- How Internet Fraud Works - Identity Theft –Cyber Stalking - Protecting Yourself against Cyber Crime - Denial of
Service Attacks -Denial of Service - Illustrating an Attack - Common Tools Used for DoS .- DoS Weaknesses - CO-2
Specific DoS attacks - Land Attack-Distributed Denial of Service (DDoS)
Hands On: Identify Open Port using telnet, Network Scanning using Hping3 ,Scanning TCP services using NMAP
What Is Industrial Espionage? - Information as an Asset - Real-World Examples of Industrial Espionage - How Does
Espionage Occur? - Phone Taps and Bugs - Protecting against Industrial Espionage - Industrial Espionage Act - Spear CO-4
Phishing - Encryption - Cryptography Basics- History of Encryption- Modern Methods - Legitimate Versus Fraudulent
Encryption Methods
REFERENCE BOOKS
Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short, “Cyber Security Essentials, Wiley publication
1.