Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

1

Cyber security syllabus for 3 month program


MODULE 1 – CORE PYTHON

1. INTRODUCTION TO PYTHON
2. OPERATORS IN PYTHON
3. DATA TYPES
4. CONTROL STATEMENTS
5. ARRAY MODULE
6. NUMPY MODULE
7. OBJECT ORIENTED PROGRAMMING APPROACH
8. CORE PROJECT

MODULE 2– PYTHON GUI

1. INTRODUCTION TO TKINTER
2. WINDOWS AND FRAMES USING TKINTER
3. FORM COMPONENTS USING TKINTER
4. MENU IN TKINTER
5. IMAGES USING TKINTER
6. FILE HANDLING WITH TKINTER
7. TKINTER PROJECT

MODULE 3 –MACHINE LEARNING MODULE

1. INTRODUCTION TO AI/ML
2. TYPES OF ML & AI ALGORITHMS
3. IMPLEMENTING DEEP LEARNING
4. TOOLS USED IN AI/ML
5. MODULES IN AI/ML
6. PRE – IMPLEMENTED AI/ML MODELS
7. IMPLEMENTATION OF ALGORITHMS USING PROJECTS
8. AI/ML BASED PROJECT

MODULE 4- INTRODUCTION - CYBER SECURITY

1. Introduction to Security and Important Terminology


2. Losses Caused due to security Attacks
3. Elements of Security
4. RISKS IN PERTAINING THE DOMESTIC USERS
5. WHAT TO BE SECURED?
6. WHAT MAKES YOUR SYSTEM VULNERABLE?
7. MAKING YOUR SYSTEM SECURE
8. BASIC SECURITY GUIDELINES
9. CORE PROJECT

FAME WORLD EDUCATIONAL HUB


2

MODULE 5– INTERNET SECURITY

1) Cookies
2) Session
3) SECURITY ISSUES WITH INSTANT MESSAGING
4) SOCIAL ENGINEERING
5) NINE MOST COMMON EXAMPLES OF SOCIAL ENGINEERING
6) SPAMMING
7) SECURITY MEASURES FOR INSTANT MESSAGING
8) RISKS WITH SOCIAL NETWORKING SITES
9) CHECKLIST FOR INTERNET SECURITY

MODULE 6- PROTECTING PASSWORDS

1) Practical Passwords
2) PASSWORD COMPROMISES
3) PASSWORD CRACKING FUNDAMENTALS
4) PASSWORD ATTACK TOOLS
5) PWNED PASSWORD
6) CREATING PRACTICAL PASSWORDS
7) “Pluck and shim” Method
8) PASSWORD DON’TS
9) Third – party password managers
10) Third – party local storage password managers

MODULE 7- Malware & Physical Attacks Cyber Security

1) ATTACKS
2) DEFENCE
3) MALWARE
4) WORMS
5) VIRUS
6) ADWARE
7) SPYWARE
8) KEYLOGGERS
9) TROJAN
10) BOTNET
11) ATTACKS WITH PHYSICAL ACCESS

MODULE 8- Encryption Cyber Security

1) Basic Terminology
2) Primary Uses Of Encryption
3) Encryption Types

FAME WORLD EDUCATIONAL HUB


3

MODULE 9 - SECURE SHOPPING

1) INTRODUCTION
2) 13 tips for safe online shopping
3) Use Familiar Websites
4) Look for the Lock
5) Don't Overshare
6) HTTP and HTTPs
7) SSL

module 10 :- final project and certification

FAME WORLD EDUCATIONAL HUB

You might also like