Professional Documents
Culture Documents
Nas2002 Advanced-Cyber-Security LTP 1.0 6 Nas2002
Nas2002 Advanced-Cyber-Security LTP 1.0 6 Nas2002
Nas2002 Advanced-Cyber-Security LTP 1.0 6 Nas2002
Expected Outcome
After successfully completing the course the student should be able to
Contribute to managing information security
Co-ordinate responses to information security incidents
Install and configure information security devices
Contribute to information security audits
Support teams to prepare for and undergo information security audits
Manage their work to meet requirements
Work effectively with colleagues
Maintain a healthy, safe and secure working environment
Provide data/information in standard formats
Develop their knowledge, skills and competence
Text Book(s)
1. Information Systems Security: Security Management, Metrics, Frameworks and Best Practices, Nina Godbole,
Wiley, 2017
2. Rhodes-Ousley, Mark. Information Security: The Complete Reference, Second Edition, . Information Security
Management: Concepts and Practice. New York, McGraw-Hill, 2013.
3. Christopher J. Alberts, Audrey J. Dorofee , Managing Information Security Risks, Addison-Wesley
Professional, 2004
Reference Books
1. Andrew Vladimirov Michajlowski, Konstantin, Andrew A. Vladimirov, Konstantin V. Gavrilenko, Assessing
Information Security: Strategies, Tactics, Logic and Framework, IT Governance Ltd, O’Reilly 2010
Christopher J. Alberts, Audrey J. Dorofee , Managing Information Security Risks, Addison-Wesley
2. Professional, 2004
Chuck Easttom , System Forensics Investigation and Response, Second Edition, Jones & Bartlett Learning,
3. 2014
David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni, Metasploit The Penetration Tester’s Guide,
4. No Starch Press, 2014
5. Ref Links:
https://www.iso.org/isoiec-27001-information-security.html
https://www.sans.org/reading-room/whitepapers/threats/paper/34180
https://csrc.nist.gov/publications/detail/sp/800-40/version-20/archive/2005-11-16
https://www.sscnasscom.com/qualification-pack/SSC/Q0901/
List of Experiments (Indicative) SLO: 1,2,17
1. Install and configure information security devices
Penetration Testing
MySQL SQL Injection
Information security incident Management
Intrusion Detection/Prevention
Port Redirection and Tunneling
Exploring the Metasploit Framework
Working with Commercial Tools like HP Web Inspect and IBM
AppScan etc.,
Explore Open Source tools like sqlmap, Nessus, Nmap etc
Documentation with Security Templates from ITIL
Carry out backups of security devices and applications in line with
information security policies, procedures and guidelines
Information security audit Tasks - Procedures/guidelines/checklists for
the audit tasks