Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Certificate Course

in
Cyber Security
2022-23
(Duration : Six Months)

Scheme and Syllabus

Rourkela Institute of Management Studies


Institutional Area, Gopabandhu Nagar, Chhend,
Rourkela-769015, Odisha

Under
Sambalpur University
Jyoti Vihar, Burla – 768019, Odisha

Page 1 of 18
Scheme of the Course
Sl. Paper
Paper Name Credits T+L
No Code
1 CS101 Network Protocols and Cryptography 4 3+1
2 CS102 Block Chain 4 3+1
3 CS103 Python Programming 4 3+1
4 CS104 Machine Learning for Cyber Security 4 3+1
5 CS105 Artificial Intelligence for Cyber Security 4 3+1
6 CS106 Ethical Hacking and Kali Linux 4 3+1
7 CS107 Project 8
Total Credit 32

N.B. : T – Theory, L – Lab

Page 2 of 18
Regulation for Certificate Programme in Cyber Security (CPCS)
1. The certificate programme in Cyber Security (CPCS) is a six months full time certificate
programme. After successful completion of the programme certificate will be provided to
the qualified students.
2. Duration:The duration of the programme shall be six months with one semester. There
will be two session in a year i.e. July to December and January to June.
3. Eligibility Criteria: the candidate should have passed the +2 examination of CHSE,
Odisha or its equivalent board / council in any discipline with minimum 40% marks in
aggregate. The selection will be based on the marks obtained in +2 examinations.
4. Number of Papers: During the course the student has to cover six papers each with 04
credits and 01 project with 08 credits. There will be approximately 10 classes of 01 hour
duration for each one credit of a paper.
5. Attendance: A candidate shall be required to attend 75% of class during a Semester.
Condonation may be granted by the Principal only to the extend of 15% in exceptional
cases i.e. Serious Illness &Hospitalization, Accident, Mishap in the family, Deputation by
the college for any specific work. The candidates falling short of required attendance
percentage will not be allowed for form fill up for the university examination. The
candidate will appear the examination in the next batch.

6. Internal Examination (50% internal marks) :


Internal marks will be assigned based on
i. Assignment / Presentation - 10 marks
ii. Attendance - 10 marks
iii. Case Discussion - 10 marks
iv. Internal Examination - I - 10 marks
Internal Examination – II - 10 marks
Total - 50 marks

7. External Examination (50% external marks) :


The external examination will be conducted by the university; the examination will be
conducted tentatively in the month of December and June.

Paper will be set by a panel of examiners to be approved by BOS

8. Passing Criteria: Each of the paper will carry 100 marks and the project will carry 200
marks. The marking will be based on numerical score. The candidate remaining absent in
either internal examination or university examination in any paper will be considered as
absent in that paper inspite of securing marks in any one of the components.

Page 3 of 18
i. To pass a paper, a candidate should score minimum 50 percent marks in that
paper with at least 40 percent marks each in Internal examination and University
examination.
ii. To pass the project, a candidate should score a minimum of 60 percent marks.
iii. In order to become eligible for awarding certificate the candidate must pass in all
individual papers and the projects.

9. Award of Certificate: A candidate meeting the passing criteria will be eligible for
certificate. The following award may be given to qualifying candidates.
i. 50% - 65% - Pass
ii. 65% - 80% - 1st Class
iii. Above 80% - 1st Class with Distinction.

10. Back Examination: Candidate failed in any papers in an examination can re-appear for
the next examination for the next batch in those papers where he / she have scored less
than 50% marks.
11. Improvement Examination: Candidate passed in all the papers and project and got pass
award may appear for improvement examination in the next examination with the next
batch students. A maximum of 03 papers can be selected for improvement and only one
chance will be provided.

12. Project Evaluation: The project will be assigned by the faculty members of the institute
after 03 months of the class commencement. Project will be evaluated through panel of
examiners whose name will be approved by BOS. There will be 200 marks for the project
where 100 marks to be given by internal faculty and balance 100 marks will be given by
external examiner. Absence in project evaluation shall be treated as fail in that paper.

13. Question paper setting: The question paper should be set in such a manner that the
question paper should cover all the units.

Page 4 of 18
Certificate Programme in Cyber Security
Course Structure

Sl. No. Paper Name Credits

1 Network Protocols and Cryptography 4

2 Block Chain 4

3 Python Programming 4

4 Machine Learning for Cyber Security 4

5 Artificial Intelligence for Cyber Security 4

6 Ethical Hacking and Kali Linux 4

7 Project 8

Page 5 of 18
Syllabus
Network Protocols and Cryptography

Objective- To Understand role of Networking and Cryptography to provide administrative &


Program security.
Total Credit-4
Hours/Week-4

Module-I Data Centers and the Enterprise Network Architecture and its Components
 : Exploring networks and data flows
 The data center, core, and user networks
 Switching (L2) and routing (L3) topologies
 The network perimeter
 The data, control, and management planes
 SDN and NFV
 Cloud connectivity
 Types of attacks and where they are implemented

Module-II Network Protocol Structures and Operations

 Data network protocols and data structures


 Layer 2 protocols – STP, VLANs, and security methods
 Layer 3 protocols – IP and ARP
 Routers and routing protocols
 Layer 4 protocols – UDP, TCP, and QUIC/GQUIC

Module-III Security Protocols and Their Implementation


 Security pillars – confidentiality, integrity, and availability
 Encryption basics and protocols
 Public key infrastructure and certificate authorities

Page 6 of 18
 Authentication basics and protocols
 Authorization and access protocols
 Hash functions and message digests
 IPSec and key management protocols
 SSL/TLS and proxies
 Network security components – RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and
WAFs
Module-IV Cryptography
 About cryptography
 Caesar cipher and ROT13
 base64 encoding
 XOR
 MD5 and SHA hashes
 Windows password hashes
 Linux password hashes
 Strong encryption with AES
 ECB and CBC modes
 Padding oracle attack
 Strong encryption with RSA

Text Books
 Tanenbaum A.S, (2013). Computer Networks, Pearson Publication
 Kurose James F. and Ross Keith W.,(2017). Computer Networking – A top down
approach featuring the Internet, Pearson Publications.
 Stallings William,(2017), Cryptography and Network Security - Principles and Practice ,
Pearson Publication

Page 7 of 18
Syllabus
Block Chain
Objective- Blockchain is a disruptive technology that promises to disrupt many sectors of the
global economy. This innovative technology aims to revolutionize those industries that rely on
intermediation and trust by shifting the paradigm away from the currently dominant centralized
architectures and toward decentralization.
Total Credit-4
Hours/Week-4
Module-I Cyber Threat Landscape and Security Challenges

 Cyber Threat Landscape and Security Challenges


 Current threat landscape
 Defender perspectives
 Live attack execution
 Emerging security challenges

Module-II Introducing Blockchain and Ethereum

 What blockchain is
 Internet versus blockchain
 How blockchain works
 The building blocks of blockchain
 Ethereum blockchain
 Private versus public blockchains
 Business adaptation

Module-III Hyperledger – Blockchain for Businesses

 Hyperledger overview
 Blockchain as a service
 Architecture and core components
 Hyperledger Fabric model

Page 8 of 18
 Bitcoin versus Etherum versus Hyperledger
 Hyperledger Fabric capabilities

Module-IV Blockchain on the CIA Security Triad

 What is the CIA security triad?


 Blockchain on confidentiality
 Blockchain on integrity
 Blockchain on availability

Text Books

 Ambadas Tulajadas Choudhari (2016). Blockchain for Enterprise Application


Developers,Wiley Publication
 Anshul Kaushik (2018),Block Chain & Crypto Currencies, Khanna Publication

Page 9 of 18
Syllabus
Python Programming
Objective- A Gentle Introduction to Python, introduces you to fundamental programming
concepts and constructs of the Python language
Total Credit-4
Hours/Week-4
Module-I Introduction to Python
 Introduction to Programming
 Coding Style and Jupyter Notebook
 Objects
 Variables and Assignment Statements
 Data Types and Data Type Conversion
Module-II Python Control Flows, Strings and Working with Built-in Compound Data Types
 Conditional Statements
 Iterations and Loops
 Strings
 Lists
 Tuples
 Dictionaries
 Functions
 Modules
 Packages
Module-III Working with Python Scripting
 Introduction to Python scripting
 Exploring Python data structures
 Python functions, classes, and managing exceptions
 Python modules and packages
 Managing dependencies and virtual environments
 Development environments for Python scripting

Page 10 of 18
Module-IV System Programming Packages and Network Scripting and extracting Information
from the Tor Network with Python
 Introducing system modules in Python
 Working with the filesystem in Python
 Managing threads in Python
 Multithreading and concurrency in Python
 Working with Python's socket.io module
 Introducing sockets in Python
 Implementing an HTTP server in Python
 Implementing a reverse shell with sockets
 Resolving IPS domains, addresses, and managing exceptions
 Port scanning with sockets
 Implementing a simple TCP client and TCP server
 Implementing a simple UDP client and UDP server

Suggested Books

 Martin C. Brown : Python : The complete Reference ,TMH Publication


 John Galbraith, Network Programming in Python: The Basic: A Detailed Guide to
Python 3 Network Programming and Management (English Edition),bpb Publication

Page 11 of 18
Syllabus
Machine Learning for Cyber Security
Objective- This paper walks you through the major phases of the threat life cycle, detailing how
you can implement smart solutions for your existing cybersecurity products and effectively build
intelligent and future-proof solutions.
Total Credit-4
Hours/Week-4

Module-I Basics of Machine Learning in Cyber security


 Definitions of machine learning and use cases
 Delving into machine learning in the cyber security world
 Different types of machine learning systems
 Different data preparation techniques
 Machine learning architecture
 A more detailed look at statistical models and machine learning models
 Model tuning to ensure model performance and accuracy
 Machine learning tools

Module-II Time Series Analysis and Ensemble Modeling


 Time series and its different classes
 Time series decomposition
 Analysis of time series in cyber security
 Prediction of DDoS attack
 Ensemble learning methods and voting ensemble methods to detect cyber attacks
Module-III Segregating Legitimate and Lousy URLs
 Understanding URLs and how they fit in the internet address scheme
 Introducing malicious URLs
 Looking at the different ways malicious URLs propagate
 Using heuristics to detect malicious URLs
 Using machine learning to detect malicious URLs

Page 12 of 18
Module-IV Knocking Down CAPTCHAs
 Characteristics of CAPTCHAs
 Using artificial intelligence to crack CAPTCHAs
 Types of CAPTCHA
 Solving CAPTCHAs with neural networks

Using Data Science to Catch Email Fraud and Spam and Efficient Network
Anomaly Detection Using k-means
 Fraudulent emails and spoofs
 Types of email fraud
 Spam detection using the Naive Bayes algorithm
 Featurization techniques that convert text-based emails into numeric values
 Spam detection with logistic regression
 Get hold of information
 Modify information
 Disrupt services
 Perform distributed denial of service to and from the server where information is
stored
 Exploit using malware and viruses
 Privilege escalation and credential compromise

Suggested Books
 Clarence Chio and David Freeman (2018). Machine Learning and Security: Protecting
Systems with Data and Algorithms O’REILLY Publications.
 McKinney, W Brij B. Gupta and Quan Z. Sheng.(2019). Machine Learning for Computer
and Cyber Security: Principle, Algorithms, and Practices (Cyber Ecosystem and
Security), CRC Press Publication

Page 13 of 18
Syllabus
Artificial Intelligence for Cyber Security
Objective-. This paper presents and demonstrates the popular and successful AI approaches and
models that you can adopt to detect potential attacks and protect your corporate systems. You'll
understand the roles of machine learning (ML) and neural networks (NNs), and deep learning
in cybersecurity, and learn how you can infuse AI capabilities when building smart defensive
mechanisms. As you advance, you'll be able to apply these strategies across a variety of
applications, including spam filters, network intrusion detection, botnet detection, and secure
authentication.
Total Credit-4
Hours/Week-4

Module-I Introduction to AI for Cyber security


 Applying AI in cyber security
 The evolution from expert systems to data mining and AI
 The different forms of automated learning
 The characteristics of algorithm training and optimization
 Beginning with AI via Jupyter Notebooks
 Introducing AI in the context of cyber security
Module-II AI for Cyber security Arsenal
 Classification
 Regression
 Dimensionality reduction
 Clustering
 Speech recognition
 Video anomaly detection
 Natural language processing (NLP)
 NLP
 Large-scale image processing
 Social media analysis

Page 14 of 18
Module-III Detecting Cyber security Threats with AI
 How to detect spam with Perceptrons
 Image spam detection with support vector machines (SVMs)
 Phishing detection with logistic regression and decision trees
 Spam detection with Naive Bayes
 Spam detection adopting NLP

Module-IV Protecting Sensitive Information and Assets


 Authentication abuse prevention
 Account reputation scoring
 User authentication with keystroke recognition
 Biometric authentication with facial recognition

Fraud Prevention with Cloud AI Solutions


 How to leverage machine learning (ML) algorithms for fraud detection
 How bagging and boosting techniques can improve an algorithm's effectiveness
 How to analyze data with IBM Watson and Jupyter Notebook
 How to resort to statistical metrics for results evaluation

Suggested Books
 Dr. Nilakshi Jain (2019). Artificial Intelligence, As per AICTE: Making a System
Intelligent,Wiley Publication
 Alessandro Parisi .(2019). Hands-On Artificial Intelligence for Cybersecurity: Implement
smart AI systems for preventing cyber attacks and detecting threats and network
anomalies, Packt Publication

Page 15 of 18
Syllabus
Ethical Hacking and Kali Linux
Objective- Expose vulnerabilities of servers and applications and help developers create robust
systems
Total Credit- 8
Hours/Week- 4

Module-I Introduction to Ethical Hacking


 Preparation
 Penetration testing
 Protecting your own system
 Server-side attacks
 Client-side attacks
 Installing Kali Linux
 Installing Metasploitable
 Installing Windows
Creating snapshots and using snapshots
Module-II Linux Basics and Type of Attacks
 Overview of Kali Linux
 Linux commands
 Updating sources
 Packet sniffing basics
 Targeted packet sniffing
 Deauthentication attacks
 What is a fake access point?
 Creating fake access points with the MANA Toolkit

Module-III Network Penetration Testing


 What is a network?
 Network basics
 Connecting to a wireless adapter

Page 16 of 18
 MAC addresses
 Wireless modes – managed and monitor
 Enabling monitor mode manually
 Enabling monitor mode using airmon-ng
 WEP theory
 Basic web cracking
 Fake authentication attack
 ARP request replay
 WPA introduction
 WPA cracking
 Handshake theory
 Capturing handshakes
 Creating wordlists
 Wordlist cracking
 Securing network from attacks

Module-IV Man-in-the-Middle Attacks


 Man-in-the-middle-attacks
 Wireshark
 ARP spoofing using arpspoof
 ARP spoofing using MITMf
 Bypassing HTTPS
 Session hijacking

Suggested Books
 Nathan Jones (2021)Hacking with Kali Linux THE ULTIMATE BEGINNERS GUIDE: Learn and
Practice the Basics of Ethical Hacking and Cybersecurity
 Ric Messier (2018) Learning Kali Linux: Security Testing, Penetration Testing, and
Ethical Hacking, OREILLY Publication

Page 17 of 18
Course Projects for Cyber Security
Name

Course CS-107
Code

Course 8
Credit

Semester

Aims and Projects will help you to build smart and practical AI-based systems
leveraging deep learning and reinforcement learning. The projects cover a
Objectives
wide range of domain problems related to healthcare, e-commerce, expert
systems, surveillance fashion industry, mobile-based applications, and self-
driving cars using techniques such as convolution neural networks, deep
reinforcement learning, LSTM-based RNNs, restricted Boltzmann machines,
generative adversarial networks, machine translation, and transfer learning.
The theoretical aspects of building the intelligent applications will enable the
reader to extend the projects in interesting ways and get them up to speed in
building impactful AI applications.
Pre-
Requisite
Platform : windows, Linux
Technology: DotNet mvc Framework, Python MVT Framework
Database: Oracle, Access, MySQL, SQLServer
API
Front end : Python, Java, HTML, DotNet
Back end: Oracle, Access, MySQL, SQLServer

Practical

Comprehensive Viva-Voice 0-0-2 (L-T-P)


Major Project 0-0-6 (L-T-P)
Total Credit (Practical) 8
Total Hours-60

Evaluation  Internal Assessment : 100%


(In presence of University appointee External Guide)

Page 18 of 18

You might also like