| Course Status : | Ongoing |
| Course Type : | Elective |
| Duration : | |
| Start Date : | |
| End Date : | |
| Exam Date : | |
| Category : | |
| Level : | None |
PART- A
UNIT 1: Introduction to cyber security
UNIT 2: Web Application Tools
2.1 Scanning for web vulnerability
2.2 Hyper Text Transfer Protocol utility
2.3 Application Inspection Tools
2.4 Password Cracking
2.5 Brute Force Tools – John the ripper and Hydra
UNIT 3: Network Defense Tools
3.1 Working of Firewall
3.2 Packet characteristics to filter
3.3 Network address translation
3.4 Virtual Private Network
3.5 Linux Firewall
3.6 Windows Firewall
PART-B
UNIT 4: Cryptography
Ciphers and Secret Message
Security Attacks and Services
Mathematical Tools for Cryptography
Theory of Block Cipher Design
Cipher Network Structures
UNIT 5: Digital Signatures, Certificates, and Standards
Digital Signature Standard and Authentication ( DSS and DSA)
Public key Infrastructure
Digital Certificates
Basics of Public Key Cryptography Standards (PKCS)
Internet Protocol and Web Security Protocols
UNIT 6: Introduction to Cyber Crime Investigation
6.1 Password Cracking
6.2 Keyloggers and Spyware
6.3 Trojan and backdoors
6.4 SQL Injection
6.5 Buffer Overflow
6.6 Attack on wireless Networks
6.7 Website Attacks
1. J. Piwprzyk, T. Hardjono, 2003, Fundamentals of Computer Security, Springer
2. Nina Godbole, Sunit Belpure, 2011, Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Publication Wiley
3. Mike Shema, 2014, Anti-Hacker Tool Kit, McGraw Hill
4. W. Stallings, 2005, Cryptography and Network Security Principles and Practices, Prentice-Hall

FOLLOW US