X
Online Degree

Cyber Security(Elective)

By Dr Richa Vijay   |   Manav Rachna International Institute of Research and Studies
UNIT 1: Introduction to cyber security UNIT 2: Web Application Tools  UNIT 3: Network Defense Tools UNIT 4: Cryptography  UNIT 5: Digital Signatures, Certificates, and Standards UNIT 6:  Introduction to Cyber Crime Investigation

SUMMARY

Course Status : Ongoing
Course Type : Elective
Duration :
Start Date :
End Date :
Exam Date :
Category :
Level : None

COURSE LAYOUT

PART- A

UNIT 1: Introduction to cyber security


1.1 Cyber  Crimes

1.2 Types of Cybercrime 

1.3 Cyberspace and Criminal Behavior 

1.4 Digital Forensics

1.5 Contemporary Crimes

1.6 Indian IT ACT 2000




UNIT 2: Web Application Tools 

2.1 Scanning for web vulnerability

2.2 Hyper Text Transfer Protocol utility

2.3 Application Inspection Tools

2.4 Password Cracking

2.5 Brute Force Tools – John the ripper and Hydra


UNIT 3: Network Defense Tools

3.1 Working of Firewall

3.2 Packet characteristics to filter

3.3 Network address translation

3.4 Virtual Private Network

3.5 Linux Firewall

3.6 Windows Firewall


PART-B

UNIT 4: Cryptography 

  1. Ciphers and Secret Message 

  2. Security Attacks and Services

  3. Mathematical Tools for Cryptography

  4. Theory of Block Cipher Design

  5. Cipher Network Structures


UNIT 5: Digital Signatures, Certificates, and Standards

  1. Digital Signature Standard and Authentication ( DSS and DSA) 

  2. Public key Infrastructure

  3. Digital Certificates 

  4.  Basics of Public Key Cryptography Standards (PKCS)

  5. Internet Protocol and Web Security Protocols


UNIT 6:  Introduction to Cyber Crime Investigation

6.1 Password Cracking

6.2 Keyloggers and Spyware

6.3 Trojan and backdoors

6.4 SQL Injection

6.5 Buffer Overflow

6.6 Attack on wireless Networks

6.7 Website Attacks


BOOKS AND REFERENCES

1. J. Piwprzyk, T. Hardjono, 2003, Fundamentals of Computer Security, Springer

2. Nina Godbole, Sunit Belpure, 2011, Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Publication Wiley

3. Mike Shema, 2014, Anti-Hacker Tool Kit, McGraw Hill

4. W. Stallings, 2005, Cryptography and Network Security Principles and Practices, Prentice-Hall


INSTRUCTOR BIO

Dr Richa Vijay

Manav Rachna International Institute of Research and Studies
Asst. Professor Dr Richa Vijay
Teaching Experience- 12 Years
Qualification- Ph.D Computer Science & Engineering (AKTU), Mtech IT, MCA
(UPTU).
Areas of Interest- Big Data, Machine Learning, Cloud Computing, Data Analytics.
Web Application Development ,DBMS.
Dr. Richa Vijay did her Ph.D from APJ Abdul Kalam State Technical University,
Lucknow in area of Cloud Computing . She did her MTech IT and MCA from UP
State Technical University Lucknow. She is currently working as Assistant
Professor in the Faculty of Computer Applications, Manav Rachna International
Institute of Research and Studies, Faridabad. She is engaged in teaching MCA
and BCA Classes and has teaching and research experience of more than 10
years. She also has 4 years of experience in IT industry as software developer.
She has published more than 6 research papers in the national and International
Scopus Journals etc. She has guided various students of MCA students for their
project works. Her main interest areas include databases, Artificial Intelligence,
Cloud Computing & .Net,Big Data.
Google Scholar Link –
https://scholar.google.co.in/citations?user=1dKeRpgAAAAJ&hl=en&authuser=1


COURSE CERTIFICATE

Ministry of Education logo Swayam logo

FOLLOW US