Cyber Security
TCS 391 Fundamentals of Cyber security
Syllabus
Unit – I
Introduction to Cyber Security What is Cyber security, Why we need Cyber security, The Zero Trust Model, Ethical Hacking Protect Against – Unauthorised Modification, Unauthorised Deletion and Unauthorised Access Three pillars of Cyber Security – Confidentiality, Availability and Integrity Steps to fix a crime – Identify Cyber Threats, Analyse and Evaluate Threat, Treatment Type of Hackers – White Hat, Great Hat, Black Hat Penetration Testing and its Phases – Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks.
Unit – II
Lecture 1 –> PPTs [Linux/Unix Basic Commands PPTs]
Linux Basics and Scripting for Ethical Hacking Bash, Linux commands, man page, Adding and deleting, users and adding them to sudo group, switching users, creating, copying, moving and removing file, Writing and appending text to a file, File permissions, working with editors, grep, cut command, Starting and stopping services, Automating tasks with cron jobs Introduction to Bash Scripting – Basics of Bash or Shell Scripting, conditional statements, loops, Manipulating files Introduction to Python – Basics of Python, conditional statements, loops,list, tuple, dictionary, functions.
Unit – III
Networking Basics for Ethical Hacking Virtualization – Installing and configuring virtual machine, Configuration of network – NAT, Bridged and Host only, Dual boot system TCP/IP – IPv4 and IPv6, IP Address, Mac Address, Subnets, TCP 3-way handshake, DNS Communication between VMs or Setting up network between machines, netcat – The Swiss Army Knife of TCP/IP Connections, use netcat to Listen on a port, pushing a command shell back to listener, transfer files, Ping command. Wireshark – A Packet Sniffing Tool.
Unit – IV
Basics of Web and Web Security Introduction to Java Script – Basics of Javascript, Input validation, Cross site scripting (XSS) attack Introduction to PHP and SQL – Basics of PHP, Input Validation, Phishing, Spear Phishing, Sql Injection Attack
Unit – V
Introduction to Cyber Threats and System Hacking Cyber Threats – Malware, password attacks, Distributed denial-of-service (DDos), Ransomware attack, Eavesdropping attack (man in the middle attack), Birthday attack, buffer overflow attack, IP and Mac address spoofing, Steganography, Anonymous browsing, Introduction to tor browser, Introduction to VPN, Secure Sockets Layer (SSL), Secure Shell (SSH).