Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
33 views2 pages

Course Structure

The document outlines a course on Cyber Threat Awareness and Prevention, aimed at providing students with essential knowledge on cybersecurity, safe digital practices, and protection against cyber threats. It covers various topics including online safety, social media security, cyber laws, and workplace cybersecurity practices, with specific learning outcomes for each unit. The course includes recommended textbooks and reference materials to support the learning objectives.

Uploaded by

Sushant kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views2 pages

Course Structure

The document outlines a course on Cyber Threat Awareness and Prevention, aimed at providing students with essential knowledge on cybersecurity, safe digital practices, and protection against cyber threats. It covers various topics including online safety, social media security, cyber laws, and workplace cybersecurity practices, with specific learning outcomes for each unit. The course includes recommended textbooks and reference materials to support the learning objectives.

Uploaded by

Sushant kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Course Name of Course L T P Credit

Type Code

AEC -- Cyber Threat Awareness and Prevention 3 0 0 3

Course Objective

The objective of this course is to provide students with a fundamental understanding of


cybersecurity awareness, safe digital practices, and protection against cyber threats. The course
will equip students with knowledge about online risks, data privacy, and responsible digital
behavior.

Learning Outcomes

Upon successful completion of this course, students will:

• Understand the importance of cybersecurity and cyber hygiene.

• Identify different types of cyber threats and security best practices.

• Learn how to secure personal and organizational data online.

• Develop awareness of cyber laws and ethical online behavior.

• Recognize and mitigate risks associated with social engineering attacks.

Unit No. Topics to be Covered Lecture Learning Outcome


Hours

1. Introduction to Cybersecurity &


Digital Risks: Overview of cyber
threats, importance of cyber
Understand fundamental cyber
awareness, common attack types 7
risks and digital threats.
(phishing, malware, ransomware,
DoS, identity theft), and case studies
on real-world cyber incidents.

2. Online Safety & Cyber Hygiene:


Secure password management, two-
Learn best practices for
factor authentication (2FA),
7 personal cybersecurity and
antivirus tools, secure browsing
online safety.
practices, and importance of
software updates.
3. Social Media Security & Digital
Footprint: Safe social media usage,
Understand risks associated
privacy settings, risks of
7 with social media and personal
oversharing, and impact of digital
data exposure.
footprint on personal and
professional life.

4. Cyber Laws, Ethics, and


Responsible Digital Behavior:
Gain knowledge about cyber
Overview of IT Act (India), GDPR,
7 laws, digital rights, and ethical
data protection laws, cyber ethics,
internet use.
cybercrime reporting, and
consequences of illegal activities.

5. Cyber Threats in Workplaces and


Organizations: Common cyber
threats in professional Understand workplace
environments, business email 7 cybersecurity practices and risk
compromise (BEC), insider threats, mitigation strategies.
and secure handling of sensitive
data.

6. Cyber Awareness Practices:


Identifying phishing emails,
Develop skills for identifying
recognizing fake websites,
7 and mitigating cybersecurity
configuring secure social media
threats.
settings, and conducting a basic
security risk assessment.

Total: 42

Text Books

1. Nina Godbole, Sunit Belapure, Cyber Security: Understanding Cyber Crimes, Computer
Forensics, and Legal Perspectives, Wiley India.

2. Harold F. Tipton, Micki Krause, Information Security Management Handbook, Auerbach


Publications.

Reference Books

1. P.W. Singer, Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know,
Oxford University Press.

2. Eric Cole, Hacker’s Beware: The Ultimate Guide to Network Security, McGraw-Hill.

You might also like