Professional Documents
Culture Documents
Cyber Security Syllabus For 3 Month Program
Cyber Security Syllabus For 3 Month Program
1. INTRODUCTION TO PYTHON
2. OPERATORS IN PYTHON
3. DATA TYPES
4. CONTROL STATEMENTS
5. ARRAY MODULE
6. NUMPY MODULE
7. OBJECT ORIENTED PROGRAMMING APPROACH
8. CORE PROJECT
1. INTRODUCTION TO TKINTER
2. WINDOWS AND FRAMES USING TKINTER
3. FORM COMPONENTS USING TKINTER
4. MENU IN TKINTER
5. IMAGES USING TKINTER
6. FILE HANDLING WITH TKINTER
7. TKINTER PROJECT
1. INTRODUCTION TO AI/ML
2. TYPES OF ML & AI ALGORITHMS
3. IMPLEMENTING DEEP LEARNING
4. TOOLS USED IN AI/ML
5. MODULES IN AI/ML
6. PRE – IMPLEMENTED AI/ML MODELS
7. IMPLEMENTATION OF ALGORITHMS USING PROJECTS
8. AI/ML BASED PROJECT
1) Cookies
2) Session
3) SECURITY ISSUES WITH INSTANT MESSAGING
4) SOCIAL ENGINEERING
5) NINE MOST COMMON EXAMPLES OF SOCIAL ENGINEERING
6) SPAMMING
7) SECURITY MEASURES FOR INSTANT MESSAGING
8) RISKS WITH SOCIAL NETWORKING SITES
9) CHECKLIST FOR INTERNET SECURITY
1) Practical Passwords
2) PASSWORD COMPROMISES
3) PASSWORD CRACKING FUNDAMENTALS
4) PASSWORD ATTACK TOOLS
5) PWNED PASSWORD
6) CREATING PRACTICAL PASSWORDS
7) “Pluck and shim” Method
8) PASSWORD DON’TS
9) Third – party password managers
10) Third – party local storage password managers
1) ATTACKS
2) DEFENCE
3) MALWARE
4) WORMS
5) VIRUS
6) ADWARE
7) SPYWARE
8) KEYLOGGERS
9) TROJAN
10) BOTNET
11) ATTACKS WITH PHYSICAL ACCESS
1) Basic Terminology
2) Primary Uses Of Encryption
3) Encryption Types
1) INTRODUCTION
2) 13 tips for safe online shopping
3) Use Familiar Websites
4) Look for the Lock
5) Don't Overshare
6) HTTP and HTTPs
7) SSL