CYBER SECURITY FUNDAMENTALS
INT529
The kick start session
Lecture #0
Course Details
LTP –3 0 0 [Three lectures]
Reference Book:
COMPTIA SECURITY+ STUDY GUIDE
JAMES PENGELLY
CompTIA
Revised Bloom’s Taxonomy
Course Assessment Model
MARKS BREAK UP
•Attendance 5
•CA (Two best out of Three CA) 25
CA consists of three test
•Mid Term Exam (MTE) 20
•End Term Exam (ETE) 50
•Total 100
Course Assessment Model
Continuous Assessment:
1. Test-1 Subjective based(2 questions of 5 marks each and 2 questions of 10 marks
each )
2. Test-2 Subjective based(2 questions of 5 marks each and 2 questions of 10 marks
each )
3. Test-3 MCQ based test (Total 30 marks; where 30 questions (1 mark each) will be
there based on the syllabus.)
Best two out of three will be considered
Program Outcomes
PO1:Applytheknowledgeofmathematics,science,engineeringfundamentals,andan
engineeringspecializationtothesolutionofcomplexengineeringproblems.
PO5::Create,select,andapplyappropriatetechniques,resources,andmodern
engineeringandITtoolsincludingpredictionandmodellingtocomplexengineering
activitieswithanunderstandingofthelimitations.
PO7::Understandtheimpactoftheprofessionalengineeringsolutionsinsocietaland
environmentalcontexts,anddemonstratetheknowledgeof,andneedforsustainable
development
PO9::Functioneffectivelyasanindividual,andasamemberorleaderindiverse
teams,andinmultidisciplinarysettings
PO12::Recognizetheneedfor,andhavethepreparationandabilitytoengagein
independentandlifelonglearninginthebroadestcontextoftechnologicalchange.
CourseContent
Unit I
•Security roles and security controls : compare and contrast information security
roles, compare and contrast security control and framework types
•Threat actors and threat intelligence : threat actor types and attack vectors, threat
intelligence sources
•Performing security assessments : organizational security with network
reconnaissance tools, security concerns with general vulnerability types,
vulnerability scanning techniques, penetration testing concepts
Course Content
Unit II
•Social engineering and malware : compare and contrast social engineering
techniques, analyze indicators of malware-based attacks
•Basic cryptographic concepts : compare and contrast cryptographic ciphers,
cryptographic modes of operation, cryptographic use cases and weaknesses, other
cryptographic technologies
•Public key infrastructure : certificates and certificate authorities, PKI
management
Course Content
Unit III
•Authentication controls : authentication design concepts, knowledge-based
authentication, authentication technologies, biometrics authentication concepts
•Identity and account management controls : identity and account types, account
policies, authorization solutions, importance of personnel policies
•Secure network designs : secure network designs, secure switching and routing,
secure wireless infrastructure, load balancers
Course Content
Unit IV
•Network security appliances : firewalls and proxy servers, network security
monitoring, the use of SIEM
•Secure network protocols : secure network operations protocols, secure
application protocols, secure remote access protocols
•Host security solutions : secure firmware, endpoint security, embedded system
security implications
Course Content
Unit V
•Secure application concepts : indicators of application attacks, indicators of web
application attacks, secure coding practices, deployment and automation concepts
•Secure cloud solutions : secure cloud and virtualization services, cloud security
solutions, infrastructure as code concepts
Course Content
Unit VI
•Data privacy and protection : privacy and data sensitivity concepts, privacy and
data protection controls
•Incident response : incident response procedures, data sources for incident
response, mitigation controls
•Digital forensics : key aspects of digital forensics documentation, key aspects of
digital forensics evidence acquisition
Relevant References(Resources):
•Securing operating system
•https://www.youtube.com/watch?v=YSwTfealIV4
•Backdoor
•https://www.youtube.com/watch?v=xjGjfiKBw1w
Career prospects of CYBER LAW
POLICIES AND COMPLIANCE
•Network Administrator
•Cybersecurity Analyst