Course Name: Advanced Program in Information Security and Cyber Laws
Prerequisite: Basic knowledge of computers. Course Duration: 60hrs Course Objective: The objective of this course is to enable the student who has knowledge of computer operations to get initiated into the field of Network Security and Cyber Laws. Internet Fundamentals 2hrs (Theory/Lab) Components of Computer DNS How Internet Works Computer Files Cloud Computing IP Addressing Static and Dynamic IP Private IP IPv4 and IPv6 DHCP NAT Securing Router Securing Gmail Computer Networking Basics 4hrs (Theory/Lab) Introduction Network Topologies TCP/IP Protocol OSI model Routing Protocols IEEE 802.11 VPN IPSec Firewall Intrusion Detection System SSL (Secure Socket Layer) Network Security Practices 3hrs (Theory/Lab) Wireless Security and Attacks Basics of Bands, Channel and Sniffing Fake Access Points MAC filter Evasion Man in the Middle Attacks SSL MITM WEP and WPA Security Loopholes Setting up VPN
Page | 2
ARP Poisoning DNS Poisoning Driftnet , Dsniff, dnsspoof Wireshark Netdown64 (Data64 tool) Stegnet64 (Data64 tool) Cryptography 7hrs (Theory/Lab) Introduction Algorithms Symmetric and Asymmetric Cryptography PKI Hash Functions Steganography Digital Signatures Digital Signature Certificates RSA Token Applied Cryptography TrueCrypt PGP GPG SNOW OpenPuff S tools Camouflage Deep Sound Crypto currency and Bitcoins 2hrs (Theory/Lab) Introduction Technical Working Proof of Work Digital Wallets Block Chain Mining Markets Attacks on Network Preventive Measures Securing your wallet Financial Importance Mining Demo
Page | 3
Business Continuity and Disaster Recovery Planning 5hrs (Theory) Contingency Planning and Resilience Types of Plans Business Continuity Plan (BCP) Continuity Of Operations (COOP) Plan Crisis Communication Plan Critical Infrastructure Protection (CIP) Plan Cyber Incident Response Plan Disaster Recovery Plan (DRP) Information System Contingency Plan (ISCP) Occupant Emergency Plan (OEP)
ISCP process ISCP Development Technical Contingency Planning Considerations Risk Assessment 7hrs (Theory) Introduction Purpose and Applicability Target Audience Related Publications Organisation of this Special Publication The Fundamentals Risk Management Process Risk Assessment Key Risk Concept Application of Risk Assessment The Process Preparing For the Risk Assessment Conducting the Risk Assessment Communicating and Sharing Risk Assessment Information Maintaining the Risk Assessment ISO 27001 Introduction to ISO 27001 GAP Analysis ISO 27001 certification audit process
Page | 4
Access Control 6hrs (Theory) Access Control Challenges Access Control Principles Access Control Criteria Access Control Practices Security Principles Identification and Authentication Identification Component Requirements Authentication Factors Authentication Methods Biometrics Passwords Cognitive Passwords One-Time or Dynamic Passwords Cryptographic Keys Passphrase Memory Cards Smart Cards Access Control Categories Administrative Physical Technical Access Control Types Access Control Threats Access Control Technologies Single Sign-On Kerberos SESAME Security Domain Thin Clients Non Discretionary or Role Based Access Control
Die Hard 4.1 2hrs (Theory/Lab) Cyber Warfare Scenario Cyber Warfare Concepts Botnets Zero Day Vulnerabilities Android Hacks Advantages of Botnets in Cyber warfare
Page | 5
God Father 2.0 1hrs (Theory/ Lab) What do Criminals Sell online? Case 1: Silk Road Case 2: Dark Market Anatomy of a Financial Cyber Crime Organisation TOR Project Onion Routing Hidden Web Working of TOR Network Practical Demo of TOR Browser
Vulnerability Assessment and Latest Vulnerability Trends 5hrs (Theory/ Lab) Introduction to Vulnerability Assessment Patch and Vulnerability management Media Sanitization Server Security Electronic Mail Security Securing Public Web Servers Secure Deployment of IPv6 Secure DNS Deployment Common Vulnerabilities and Exposures (CVE) Latest Vulnerability Trends Heart Bleed Bug Covert redirection Windows Exploits
Cyber Laws 16hrs (Theory/ Case Studies) Fundamentals of Cyber Law E commerce- Legal Issues Penalties and Offences under the IT Act and Offences under the Indian Penal Code Intellectual Property Issues and Cyber Space Indian Perspective International Cyber Crime Law Case Studies (Asian School of Cyber Laws)