Sunteți pe pagina 1din 5

Page | 1

Course Name: Advanced Program in Information Security and Cyber Laws


Prerequisite: Basic knowledge of computers. Course Duration: 60hrs
Course Objective: The objective of this course is to enable the student who has knowledge of
computer operations to get initiated into the field of Network Security and Cyber Laws.
Internet Fundamentals 2hrs (Theory/Lab)
Components of Computer
DNS
How Internet Works
Computer Files
Cloud Computing
IP Addressing
Static and Dynamic IP
Private IP
IPv4 and IPv6
DHCP
NAT
Securing Router
Securing Gmail
Computer Networking Basics 4hrs (Theory/Lab)
Introduction
Network Topologies
TCP/IP Protocol
OSI model
Routing Protocols
IEEE 802.11
VPN IPSec
Firewall
Intrusion Detection System
SSL (Secure Socket Layer)
Network Security Practices 3hrs (Theory/Lab)
Wireless Security and Attacks
Basics of Bands, Channel and Sniffing
Fake Access Points
MAC filter Evasion
Man in the Middle Attacks
SSL MITM
WEP and WPA Security Loopholes
Setting up VPN

Page | 2


ARP Poisoning
DNS Poisoning
Driftnet , Dsniff, dnsspoof
Wireshark
Netdown64 (Data64 tool)
Stegnet64 (Data64 tool)
Cryptography 7hrs (Theory/Lab)
Introduction
Algorithms
Symmetric and Asymmetric Cryptography
PKI
Hash Functions
Steganography
Digital Signatures
Digital Signature Certificates
RSA Token
Applied Cryptography
TrueCrypt
PGP
GPG
SNOW
OpenPuff
S tools
Camouflage
Deep Sound
Crypto currency and Bitcoins 2hrs (Theory/Lab)
Introduction
Technical Working
Proof of Work
Digital Wallets
Block Chain
Mining
Markets
Attacks on Network
Preventive Measures
Securing your wallet
Financial Importance
Mining Demo


Page | 3



Business Continuity and Disaster Recovery Planning 5hrs (Theory)
Contingency Planning and Resilience
Types of Plans
Business Continuity Plan (BCP)
Continuity Of Operations (COOP) Plan
Crisis Communication Plan
Critical Infrastructure Protection (CIP) Plan
Cyber Incident Response Plan
Disaster Recovery Plan (DRP)
Information System Contingency Plan (ISCP)
Occupant Emergency Plan (OEP)

ISCP process
ISCP Development
Technical Contingency Planning Considerations
Risk Assessment 7hrs (Theory)
Introduction
Purpose and Applicability
Target Audience
Related Publications
Organisation of this Special Publication
The Fundamentals
Risk Management Process
Risk Assessment
Key Risk Concept
Application of Risk Assessment
The Process
Preparing For the Risk Assessment
Conducting the Risk Assessment
Communicating and Sharing Risk Assessment Information
Maintaining the Risk Assessment
ISO 27001
Introduction to ISO 27001
GAP Analysis
ISO 27001 certification audit process




Page | 4

Access Control 6hrs (Theory)
Access Control Challenges
Access Control Principles
Access Control Criteria
Access Control Practices
Security Principles
Identification and Authentication
Identification Component Requirements
Authentication Factors
Authentication Methods
Biometrics
Passwords
Cognitive Passwords
One-Time or Dynamic Passwords
Cryptographic Keys
Passphrase
Memory Cards
Smart Cards
Access Control Categories
Administrative
Physical
Technical
Access Control Types
Access Control Threats
Access Control Technologies
Single Sign-On
Kerberos
SESAME
Security Domain
Thin Clients
Non Discretionary or Role Based Access Control

Die Hard 4.1 2hrs (Theory/Lab)
Cyber Warfare Scenario
Cyber Warfare Concepts
Botnets
Zero Day Vulnerabilities
Android Hacks
Advantages of Botnets in Cyber warfare



Page | 5


God Father 2.0 1hrs (Theory/ Lab)
What do Criminals Sell online?
Case 1: Silk Road
Case 2: Dark Market
Anatomy of a Financial Cyber Crime Organisation
TOR Project
Onion Routing
Hidden Web
Working of TOR Network
Practical Demo of TOR Browser

Vulnerability Assessment and Latest Vulnerability Trends 5hrs (Theory/ Lab)
Introduction to Vulnerability Assessment
Patch and Vulnerability management
Media Sanitization
Server Security
Electronic Mail Security
Securing Public Web Servers
Secure Deployment of IPv6
Secure DNS Deployment
Common Vulnerabilities and Exposures (CVE)
Latest Vulnerability Trends
Heart Bleed Bug
Covert redirection
Windows Exploits

Cyber Laws 16hrs (Theory/ Case Studies)
Fundamentals of Cyber Law
E commerce- Legal Issues
Penalties and Offences under the IT Act and Offences under the Indian Penal Code
Intellectual Property Issues and Cyber Space Indian Perspective
International Cyber Crime Law
Case Studies (Asian School of Cyber Laws)

S-ar putea să vă placă și