This document outlines the syllabus for a cyber security course with 5 units covering key topics. The course is classified as core, carries 4 credits, and has prerequisites in basic internet and data security knowledge. The 5 units cover: 1) introduction to cyber security concepts, 2) security in operating systems and networks, 3) security countermeasures like cryptography and firewalls, 4) privacy concepts in cyberspace, and 5) security management and incident handling. The course involves 90 lecture hours over the 5 units and recommends a reference book on security in computing.
This document outlines the syllabus for a cyber security course with 5 units covering key topics. The course is classified as core, carries 4 credits, and has prerequisites in basic internet and data security knowledge. The 5 units cover: 1) introduction to cyber security concepts, 2) security in operating systems and networks, 3) security countermeasures like cryptography and firewalls, 4) privacy concepts in cyberspace, and 5) security management and incident handling. The course involves 90 lecture hours over the 5 units and recommends a reference book on security in computing.
This document outlines the syllabus for a cyber security course with 5 units covering key topics. The course is classified as core, carries 4 credits, and has prerequisites in basic internet and data security knowledge. The 5 units cover: 1) introduction to cyber security concepts, 2) security in operating systems and networks, 3) security countermeasures like cryptography and firewalls, 4) privacy concepts in cyberspace, and 5) security management and incident handling. The course involves 90 lecture hours over the 5 units and recommends a reference book on security in computing.
Basic knowledge in Internet and Syllabus 2023-24 Pre- requisite data crimes. version Onwards Course Objectives • Students should be able to understand. • The transformation between threat, risk, attack and vulnerability. • How threats materialize into attacks. • To find information about threats, vulnerabilities and attacks. Unit I INTRODUCTION TO CYBER SECURITY 17 Introduction -Computer Security - Threats -Harm - Vulnerabilities - Controls - Authenticat Access Control and Cryptography - Web—User Side - Browser Attacks - Web At Targeting Users - Obtaining User or Website Data - Email Attacks Unit II SECURITY IN OPERATING SYSTEM & NETWORKS 17 Security in Operating Systems - Security in the Design of Operating Systems -Rootkit - Network security attack- Threats to Network Communications - Wireless Network Security - Denial of Service - Distributed Denial-of- Service. Unit III DEFENCES: SECURITY COUNTERMEASURES 16 Cryptography in Network Security - Firewalls - Intrusion Detection and Prevention Systems - Network Management - Databases - Security Requirements of Databases - Reliability and Integrity - Database Disclosure - Data Mining and Big Data. Unit IV PRIVACY IN CYBERSPACE 20 Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy – Data Mining - Privacy on the Web - Email Security - Privacy Impacts of Emerging Technologies- Where the Field Is Headed. Unit V MANAGEMENT AND INCIDENTS 20 Security Planning - Business Continuity Planning - Handling Incidents - Risk Analysis - Dealing with Disaster - Emerging Technologies - The Internet of Things - Economics - Electronic Voting - Cyber Warfare- Cyberspace and the Law - International Laws - Cyber crime - Cyber Warfare and Home Land Security. Total Lecture Hours 90 Hours Reference Book(s) 1 Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in computing