Course Course Name of Course L T P Credit
Type Code
AEC -- Cyber Threat Awareness and Prevention 3 0 0 3
Course Objective
The objective of this course is to provide students with a fundamental understanding of
cybersecurity awareness, safe digital practices, and protection against cyber threats. The course
will equip students with knowledge about online risks, data privacy, and responsible digital
behavior.
Learning Outcomes
Upon successful completion of this course, students will:
• Understand the importance of cybersecurity and cyber hygiene.
• Identify different types of cyber threats and security best practices.
• Learn how to secure personal and organizational data online.
• Develop awareness of cyber laws and ethical online behavior.
• Recognize and mitigate risks associated with social engineering attacks.
Unit No. Topics to be Covered Lecture Learning Outcome
Hours
1. Introduction to Cybersecurity &
Digital Risks: Overview of cyber
threats, importance of cyber
Understand fundamental cyber
awareness, common attack types 7
risks and digital threats.
(phishing, malware, ransomware,
DoS, identity theft), and case studies
on real-world cyber incidents.
2. Online Safety & Cyber Hygiene:
Secure password management, two-
Learn best practices for
factor authentication (2FA),
7 personal cybersecurity and
antivirus tools, secure browsing
online safety.
practices, and importance of
software updates.
3. Social Media Security & Digital
Footprint: Safe social media usage,
Understand risks associated
privacy settings, risks of
7 with social media and personal
oversharing, and impact of digital
data exposure.
footprint on personal and
professional life.
4. Cyber Laws, Ethics, and
Responsible Digital Behavior:
Gain knowledge about cyber
Overview of IT Act (India), GDPR,
7 laws, digital rights, and ethical
data protection laws, cyber ethics,
internet use.
cybercrime reporting, and
consequences of illegal activities.
5. Cyber Threats in Workplaces and
Organizations: Common cyber
threats in professional Understand workplace
environments, business email 7 cybersecurity practices and risk
compromise (BEC), insider threats, mitigation strategies.
and secure handling of sensitive
data.
6. Cyber Awareness Practices:
Identifying phishing emails,
Develop skills for identifying
recognizing fake websites,
7 and mitigating cybersecurity
configuring secure social media
threats.
settings, and conducting a basic
security risk assessment.
Total: 42
Text Books
1. Nina Godbole, Sunit Belapure, Cyber Security: Understanding Cyber Crimes, Computer
Forensics, and Legal Perspectives, Wiley India.
2. Harold F. Tipton, Micki Krause, Information Security Management Handbook, Auerbach
Publications.
Reference Books
1. P.W. Singer, Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know,
Oxford University Press.
2. Eric Cole, Hacker’s Beware: The Ultimate Guide to Network Security, McGraw-Hill.