Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
5 views3 pages

Syllabus

cyber security

Uploaded by

suneetha prabhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views3 pages

Syllabus

cyber security

Uploaded by

suneetha prabhu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

SEMESTER – VII

Course Name : Cyber Security and Forensics Course Code : BCSCF713


No. of Lecture Hours / Week : 03 CIE Marks : 50
No. of Tutorial / Practical : 00 SEE Marks : 50
Hours / Week
Total No. of Lecture + SEE Duration : 03 Hrs.
Tutorial / Practical Hours : 40
L:T:P : 3:0:0 CREDITS : 3
Course Prerequisites:
Basic understanding of computer networks and security concepts
Course Overview
Cyber Security and Forensics is an interdisciplinary field that offers applications based on the fundamental
concepts of Computer Science like Computer Networks, Operating Systems, and Databases. It deals with
approaches to secure computing systems and data during cyber-attacks. Furthermore, it also discusses
approaches for analysing the resources after an attack incident, through digital forensics, providing preventive
measures
Course Learning Objectives (CLO)
• To understand various cyber offenses and attacks
• To gain knowledge on various tools and techniques used in cybercrimes
• To understand the state-of-the-art of cyber security research and development
• To analyse use cases of real-world cyber-attack incidents and map them to the theoretical concepts
Modules Teaching
Hours
Module 1
Introduction to Cybersecurity
What is Cybersecurity?, The Importance of Cybersecurity, Common Cybersecurity Threats,
Essential Concepts in Cybersecurity, Password Security and Management, Two-Factor
Authentication (2FA) Secure Browsing and Phishing Awareness, Social Engineering and Online 08
Scams, Types of Malware, Email Security and Spam Filtering
SLT: Understanding the Cybersecurity Landscape
Textbook 1: Ch. 1.1 – 1.5,2.1 -2.4,4.1,4.4

Module 2

System Security
Database Security: The need for database security, SQL injection attacks; Malicious Software:
Types of malicious software (Malware), Advanced persistent threat, Propagation, Payload, 08
Countermeasures
SLT: Propagation – social engineering – spam email, trojans; Payload – stealthing – backdoor,
rootkits
Textbook 3: Ch. 5.1, 5.4, 6.1 – 6.10.

MODULE 3 08

1
Resource Management and Risk Analysis
Denial-of-service (DoS) Attacks: DoS attacks, Flooding attacks, Distributed DoS attacks, Defenses
against DoS attacks, Responding to a DoS attack; IT Security Management and Risk Assessment:
IT security management, Organizational context and security policy, Security risk assessment,
Detailed security risk analysis
SLT: Case study: Silver Star Mines

Textbook 3: Ch. 7.1 – 7.3, 7.6, 7.7, 14.1 – 14.5

MODULE 4
Understanding Computer Forensics
Introduction, historical background of cyber forensics, digital forensic science, the need for
computer forensics, cyber forensics and digital evidence, digital forensics life cycle, chain of 08
custody concept, approaching a computer forensics investigation
SLT: Challenges in computer forensics
Textbook 2: Ch. 7.1 – 7.5, 7.7, 7.8, 7.10, 7.16
MODULE 5
Computer Forensics: A Survey on the State-of-the-art
Survey (P1): Introduction, Computer forensic analysis, State-of-the-art computer forensic tools,
Comparative analysis;
Design (P2): Introduction, A brief review of the network forensics education, Challenges in 08
designing network forensics labs
SLT: Discussion and design of the network forensics lab
Paper 1 (P1): Section 1 – Section 5
Paper 2 (P1): Section 1 – Section 4
Textbooks/References
1. Textbook 1: Cyber Security for Beginners, , Akella Sarveswara,Mir Iqbal Faheem
2. Textbook 2: Sunit Belapure and Nina Godbole, "Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives," Wiley India Pvt Ltd, ISBN: 978-81-265-21791, 2011, First Edition
(Reprinted 2018).
3. Textbook 3: William Stallings and Lawrie Brown, “Computer Security: Principles and Practice,” Pearson, ISBN:
978-0-13-377392-7, Third Edition.
4. Paper 1: Abdul Rehman Javed, Waqas Ahmed, Mahmoun Alazab, Zunera Jalil, Kashif Kifayat, and Thippa Reddy
Gadekallu, “A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges,
and Future Directions,” IEEE Access, vol. 10, pp. 11065 – 11089, 2022.
https://doi.org/10.1109/ACCESS.2022.3142508.
5. Paper 2: Kewei Sha, Wei Wei, and Arpit Jain, “Design of Network Forensics Labs for Teaching-oriented
Institutions”, International Conference on Computational Science and Computational Intelligence (CSCI), pp.
959 – 963, 2021. https://doi.org/10.1109/CSCI54926.2021.00213.
1. Simon Holmes, Clive Harber, “Getting MEAN with Mongo, Express, Angular, and Node” second edition, 2019.

2
Reference Books
1. 1 John R Vacca, “Computer Forensics,” 2nd Edition, Charles River Media, Inc., New Delhi, 2017
2. Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer Forensics and Investigations,”
CENGAGE Learning, 2018
3. Brooks, Charles J, Christopher Grow, Phillip Craig, and Donald Short, “Cybersecurity Essentials,” ISBN:
978-1-119-36239-5, 2018
Course Outcomes (COs):
CO1 Understand the techniques for Cybercrime and cyber forensics
CO2 Illustrate the different types of Cybercrime and cyber forensics
jCO3 Analyze the various tools and techniques for cybercrimes and methods associated with cyber forensics
CO4 Demonstrate real world scenarios of cybercrimes and forensics in a team (PO5,PO8)

CO – PO – PSO Matrix

P PSO
CO O
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PSO1 PSO2 PSO3

CO1 2 2

CO2 3 2
CO3 2 2
CO4 2 2 2
Avg 2.5 2 2 2 2

You might also like