Why this Course on Cyber Security?
The course on Cyber Security is very important in this digital era due to dependency on online operations, social media practices, upcoming technologies like IoT, IIoT, IoT, digitization, and the pervasive nature of mobile devices.
Secure online operations and safe handling of devices are the need of the hour. One must understand the security challenges as well as the best practices that are essential to protect one from becoming a victim of cybercrimes. Fundamental knowledge in Cyber Security is very much required to understand the current status of the cyber world.
It is imperative to safeguard the individual, society, organization, and the government from the dangers of cyber frauds, scams, threats, and attacks. A complete and Comprehensive course can achieve this. This course is an inclusive course that covers all the aspects essential for understanding and for further exploration in Cyber Security Domain.
Who is the intended audience?
Any Post Graduate Level Student, Working Professionals, and those who are interested in Cyber Security are eligible to attend the course. For those who wish to further specialize in Cyber Security and would like to become certified Professionals, it is an ideal course for a good beginning.
How will the learners benefit from this course?
It is a Course at Post Graduate level for credit transfer. After completing the course successfully, and passing the examination, the student can earn the credit and become eligible for credit transfer.
Not only for students and working professionals, but this course also serves as an important Course for any responsible citizen, as it covers all aspects of Cyber Security including Cyberlaw. It is very important to note the legal implications of Cyber Crimes, Scams, and Fraud.
Are there any prerequisites?
There are no prerequisites for this course. However, fundamental knowledge in computers is desirable to understand the terminology and concepts better.
Week – 1
- Introduction to Cyber Space
- Introduction to Information Systems
- Need for Cyber Security
Week – 2
- Introduction to Cyber Attacks
- Classification of Cyber Attacks
- Classification of Malware, Threats
Week – 3
- Vulnerability Assessment
- Intrusion Detection Systems
- Intrusion Prevention Systems
Week – 4
- Introduction to User Authentication Methods
- Biometric Authentication Methods
- Biometric Systems
Week – 5
- Different Security Models and Security Mechanisms
- Information Security and Network Security
- Operating System Security
Week – 6
- Web Security
- Email Security
- Mobile Device Security, Cloud Security
Week – 7
- IoT Security
- Cyber-Physical System Security
- Social Media Security
Week – 8
- Virtual Currency
- Blockchain Technology
- Security Auditing
Week – 9
- Cyber Crimes
- Different Types of Cyber Crimes, Scams and Frauds
Week – 10
- Analysis of Crimes, Human Behavior
- Stylometry, Incident Handling
Week – 11
- Investigation Methods
- Criminal Profiling, Cyber Trails
Week – 12
- Digital Forensics, History, Challenges
- Branches of Digital Forensics
Week – 13
- Digital Forensic Investigation Methods
- Reporting, Management of Evidence
Week – 14
- Cyber Law-Basics
- Information Technology Act 2000
- Amendments to IT Act 2000
Week – 15
- Evidentiary value of Email/SMS, Cybercrimes and Offenses dealt with IPC
- RBI Act and IPR Act in India
- Jurisdiction of Cyber Crime, Cyber Security Awareness Tips