1. Why this Course on Cyber Security?
The course on Cyber Security is very important in this digital era due to dependency on online operations, social media practices, upcoming technologies like IoT, IIoT, IoE, digitization and pervasive nature of mobile devices. Secure online operations and safe handling of devices are the need of the hour. One must understand the security challenges as well as the best practices that are essential to protect one from becoming the victims of cybercrimes. Fundamental knowledge in Cyber Security is very much required to understand the current status of cyber world. It is imperative to safe-guard the individual, society, organization and the government from the dangers of cyber frauds, scams, threats and attacks. A complete and Comprehensive course can achieve this. This course is an inclusive course that covers all the aspects essential for understanding and for further exploration in Cyber Security Domain.
2. Who are the intended audience?
Any Post Graduate Level Student, Working Professionals and those who are interested in Cyber Security are eligible to attend the course. For those who wish to further specialize in Cyber Security and would like to become certified Professionals, it is an ideal course for a good begining.
3. How will the learners benefit from this course?
It is a Course at Post Graduate level for credit transfer. After completing the course successfully, and passing the examination, the student can earn the credit and become eligible for credit transfer.
Not only for students and working Professionals, this course serves as an important Course for any responsible citizen, as it covers all aspects in Cyber Security including Cyberlaw. It is very important to note the legal implications of Cyber Crimes, Scams and Frauds.
4. Are there any prerequisites?
There are no prerequisites for this course. However, a fundamental knowledge in computers is desirable to understand the terminology and concepts better.
COURSE LAYOUT Week - 1
1.Introduction to Cyber Space2.Introduction to Information Systems3.Need for Cyber Security
Week - 2
4.Introduction to Cyber Attacks5.Classification of Cyber Attacks6.Classification of Malware, Threats
Week - 3
7.Vulnerability Assessment8.Intrusion Detection Systems9.Intrusion Prevention Systems
Week - 4
10.Introduction to User Authentication Methods11.Biometric Authentication Methods12.Biometric Systems
Week - 5
13.Different Security Models and Security Mechanisms14.Information Security and Network Security15.Operating System Security
Week - 6
16.Web Security17.Email Security18.Mobile Device Security, Cloud Security
Week - 7
19.IoT Security20.Cyber Physical System Security21.Social Media Security
Week - 8
22.Virtual Currency23.Block Chain Technology24.Security Auditing
Week - 9
25.Cyber Crimes26.Different Types of Cyber Crimes, Scams and Frauds
Week - 10
27.Analysis of Crimes, Human Behavior28.Stylometry, Incident Handling
Week - 11
29.Investigation Methods30.Criminal Profiling, Cyber Trails
Week - 12
31.Digital Forensics, History, Challenges32.Branches of Digital Forensics
Week - 13
33.Digital Forensic Investigation Methods34.Reporting, Management of Evidence
Week - 14
35.Cyber Law-Basics36.Information Technology Act 200037.Amendments to IT Act 2000
Week - 15
38.Evidentiary value of Email/SMS, Cybercrimes and Offenses dealt with IPC39.RBI Act and IPR Act in India40.Jurisdiction of Cyber Crime, Cyber Security Awareness Tips