INT529 zero lecture.pptdsfsdffewwretetrtetretr

SanjeevKumarSinha13 12 views 16 slides Jul 29, 2024
Slide 1
Slide 1 of 16
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16

About This Presentation

details


Slide Content

CYBER SECURITY FUNDAMENTALS
INT529
The kick start session
Lecture #0

Course Details
LTP –3 0 0 [Three lectures]
Reference Book:
COMPTIA SECURITY+ STUDY GUIDE
JAMES PENGELLY
CompTIA

Revised Bloom’s Taxonomy

Course Assessment Model
MARKS BREAK UP
•Attendance 5
•CA (Two best out of Three CA) 25
CA consists of three test
•Mid Term Exam (MTE) 20
•End Term Exam (ETE) 50
•Total 100

Course Assessment Model
Continuous Assessment:
1. Test-1 Subjective based(2 questions of 5 marks each and 2 questions of 10 marks
each )
2. Test-2 Subjective based(2 questions of 5 marks each and 2 questions of 10 marks
each )
3. Test-3 MCQ based test (Total 30 marks; where 30 questions (1 mark each) will be
there based on the syllabus.)
Best two out of three will be considered

Course Outcomes
CO1::understandthebasicconceptsofcybersecurityandtheirimportanceinthe
cyberworld
CO2::identifyvariousvulnerabilitiesandsecurityflawsintheoperatingsystems,
webservers,networkequipmentsandbeabletopatchthem
CO3::observethemeasurestoprotectasystemfrompossiblesecuritybreaches
CO4::identifysecuritypracticestosecurethesystems
CO5::analyzethesecurityrisksandformulateariskmanagementplan
CO6::outlineanincidentresponseanddigitalforensicsprocessincaseofsecurity
breach

Program Outcomes
PO1:Applytheknowledgeofmathematics,science,engineeringfundamentals,andan
engineeringspecializationtothesolutionofcomplexengineeringproblems.
PO5::Create,select,andapplyappropriatetechniques,resources,andmodern
engineeringandITtoolsincludingpredictionandmodellingtocomplexengineering
activitieswithanunderstandingofthelimitations.
PO7::Understandtheimpactoftheprofessionalengineeringsolutionsinsocietaland
environmentalcontexts,anddemonstratetheknowledgeof,andneedforsustainable
development
PO9::Functioneffectivelyasanindividual,andasamemberorleaderindiverse
teams,andinmultidisciplinarysettings
PO12::Recognizetheneedfor,andhavethepreparationandabilitytoengagein
independentandlifelonglearninginthebroadestcontextoftechnologicalchange.

CourseContent
Unit I
•Security roles and security controls : compare and contrast information security
roles, compare and contrast security control and framework types
•Threat actors and threat intelligence : threat actor types and attack vectors, threat
intelligence sources
•Performing security assessments : organizational security with network
reconnaissance tools, security concerns with general vulnerability types,
vulnerability scanning techniques, penetration testing concepts

Course Content
Unit II
•Social engineering and malware : compare and contrast social engineering
techniques, analyze indicators of malware-based attacks
•Basic cryptographic concepts : compare and contrast cryptographic ciphers,
cryptographic modes of operation, cryptographic use cases and weaknesses, other
cryptographic technologies
•Public key infrastructure : certificates and certificate authorities, PKI
management

Course Content
Unit III
•Authentication controls : authentication design concepts, knowledge-based
authentication, authentication technologies, biometrics authentication concepts
•Identity and account management controls : identity and account types, account
policies, authorization solutions, importance of personnel policies
•Secure network designs : secure network designs, secure switching and routing,
secure wireless infrastructure, load balancers

Course Content
Unit IV
•Network security appliances : firewalls and proxy servers, network security
monitoring, the use of SIEM
•Secure network protocols : secure network operations protocols, secure
application protocols, secure remote access protocols
•Host security solutions : secure firmware, endpoint security, embedded system
security implications

Course Content
Unit V
•Secure application concepts : indicators of application attacks, indicators of web
application attacks, secure coding practices, deployment and automation concepts
•Secure cloud solutions : secure cloud and virtualization services, cloud security
solutions, infrastructure as code concepts

Course Content
Unit VI
•Data privacy and protection : privacy and data sensitivity concepts, privacy and
data protection controls
•Incident response : incident response procedures, data sources for incident
response, mitigation controls
•Digital forensics : key aspects of digital forensics documentation, key aspects of
digital forensics evidence acquisition

Relevant References(Resources):
•Securing operating system
•https://www.youtube.com/watch?v=YSwTfealIV4
•Backdoor
•https://www.youtube.com/watch?v=xjGjfiKBw1w

Career prospects of CYBER LAW
POLICIES AND COMPLIANCE
•Network Administrator
•Cybersecurity Analyst
Tags