Syllabus
Unit 1: Introduction
Overview of Cyber Security, History of the Internet, The CIA Triad (Confidentiality, Integrity, Availability), Reasons for Cyber Crime, Importance of Cyber Security, Types and Characteristics of Cybercriminals
Classification of Cyber Crimes, Overview of Cyber Laws, The Indian IT Act Cybercrime and Its Punishments
Unit 2: Cyber Attacks and Defense Mechanisms
Open Web Application Security Project (OWASP), Threats and Vulnerabilities in Cyber Attacks, Types of Malicious Attacks, Common Attack Vectors, Social Engineering Attacks, Wireless Network Attacks, Web Application Attacks, Tools Used in Cyber Attacks, Defensive Countermeasures
Unit 3: Cyber Reconnaissance Techniques
Introduction to Reconnaissance, Definition and Importance, Reconnaissance in the Cyber Attack Lifecycle, Passive Reconnaissance: Overview, Harvester Tool, Whois Lookup, Netcraft Tool, Active Reconnaissance: Overview, Nmap (Network Mapper), Ping Sweeps, Traceroute, Extracting Information from DNS, Extracting Information from Email Servers, Social Engineering Reconnaissance, Scanning Techniques: Port Scanning, Network Scanning, Vulnerability Scanning
Unit 4: Intrusion Detection Systems (IDS)
Host-Based Intrusion Detection, Network-Based Intrusion Detection, Distributed or Hybrid Intrusion Detection, Intrusion Detection Exchange Format, Honeypots
Unit 5: Intrusion Prevention Systems (IPS)
Definition and Importance of IPS, Need for Firewalls, Types of Firewalls: Packet Filtering Firewalls, Stateful Inspection Firewalls, Proxy Firewalls, Firewall Placement and Configuration, Common IPS Techniques: Signature-Based Detection, Anomaly-Based Detection, Policy-Based Detection, Heuristic Detection.
Syllabus:
Unit – I
Introduction to Cyber Security What is Cyber security, Why we need Cyber security, The Zero Trust Model, Ethical Hacking Protect Against – Unauthorised Modification, Unauthorised Deletion and Unauthorised Access Three pillars of Cyber Security – Confidentiality, Availability and Integrity Steps to fix a crime – Identify Cyber Threats, Analyse and Evaluate Threat, Treatment Type of Hackers – White Hat, Great Hat, Black Hat Penetration Testing and its Phases – Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks.
Unit – II
Linux Basics and Scripting for Ethical Hacking Bash, Linux commands, man page, Adding and deleting, users and adding them to sudo group, switching users, creating, copying, moving and removing file, Writing and appending text to a file, File permissions, working with editors, grep, cut command, Starting and stopping services, Automating tasks with cron jobs Introduction to Bash Scripting – Basics of Bash or Shell Scripting, conditional statements, loops, Manipulating files Introduction to Python – Basics of Python, conditional statements, loops, list, tuple, dictionary, functions.
Unit – III
Networking Basics for Ethical Hacking Virtualization – Installing and configuring virtual machine, Configuration of network – NAT, Bridged and Host only, Dual boot system TCP/IP – IPv4 and IPv6, IP Address, Mac Address, Subnets, TCP 3-way handshake, DNS Communication between VMs or Setting up network between machines, netcat – The Swiss Army Knife of TCP/IP Connections, use netcat to Listen on a port, pushing a command shell back to listener, transfer files, Ping command. Wireshark – A Packet Sniffing Tool.
Unit – IV
Basics of Web and Web Security Introduction to Java Script – Basics of JavaScript, input validation, Cross site scripting (XSS) attack Introduction to PHP and SQL – Basics of PHP, Input Validation, Phishing, Spear Phishing, Sql Injection Attack
Unit – V
Introduction to Cyber Threats and System Hacking Cyber Threats – Malware, password attacks, distributed denial-of-service (DDos), Ransomware attack, Eavesdropping attack (man in the middle attack), Birthday attack, buffer overflow attack, IP and Mac address spoofing, Steganography, Anonymous browsing, Introduction to tor browser, Introduction to VPN, Secure Sockets Layer (SSL), Secure Shell (SSH)
Text Book:
- B. B. Gupta, D. P. Agrawal, Hoaxing Wang, Computer and Cyber Security: Principles,
Algorithm, Applications, and Perspectives, CRC Press, ISBN 9780815371335, 2018.
- William Stallings, “Cryptography and Network Security: Principles and Practice.”, Prentice Hall.
- Edward Amoroso, “Fundamentals of Computer Security Technology”, Prentice-Hal
Reference Books:
- Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Cyber Forensics and Legal Perspectives,” Wiley India,2011.