Syllabus UNIT-I 10 Hrs. Cyber security Concepts and Threats: Introduction to Cybersecurity : Concepts, Goals (CIA Triad), Evolution and Need for Cybersecurity , Threats: Malware, Ransomware , Phishing, Insider Attacks, Vulnerability, Exploit, Risk, Attack Surface, Attack Classifications: Passive vs Active, Structured vs Unstructured.-Reference: T1: Ch. 1, 2, 3; T2: Ch. 1 UNIT–II 10 Hrs. Cryptography Principles and Algorithms: Classical Cryptographic Techniques: Caesar, Monoalphabetic, Vigenère, Symmetric Encryption: DES, AES, Asymmetric Encryption: RSA, Hash Functions: MD5, SHA, HMAC, Digital Signatures, PKI, Certificates, Cryptographic Applications in Embedded Systems.- Reference: T2: Ch. 2, 3, 4, 5, 10; T1: Ch. 4 (overview) UNIT–III 10 Hrs. Network and System Security: Firewalls, IDS/IPS, VPNs, Secure Protocols: HTTPS, SSL/TLS, SSH, IPsec, Network Attacks: DDoS, Sniffing, Spoofing, Authentication: Passwords, Tokens, Biometrics, Embedded System Security: Secure Boot, Firmware Protection.-Reference: T1: Ch. 5, 6; T2: Ch. 13, 14 UNIT–IV 10 Hrs. Cyber Laws, Ethics, and Emerging Trends: Cyber Ethics: Code of Conduct, Privacy, Cybercrime and Legal Framework: IT Act 2000, Digital Forensics and Evidence, Emerging Trends: AI in Cybersecurity, Blockchain, Quantum Security, Security in IIoT and Smart Systems.-Reference: T1: Ch. 7, 8, 9, 10; T2: Ch. 22 Reference Books * 1. Nina Godbole & Sunit Belapure, Cyber Security, 1st Edition, Wiley India 2. William Stallings, Cryptography and Network Security, 8th Edition, Pearson Reference Materials: NPTEL: Introduction to Cyber Security CERT-IN Guidelines IEEE Xplore (Recent research articles on ECE-relevant security topics) Course Outcomes After completion of the course student will be able to: CO1 Understand the fundamental concepts of cybersecurity, including the CIA triad, threat landscape, and security mechanisms. CO2 Analyze various types of cyberattacks, vulnerabilities, and risk mitigation strategies using cryptographic and security principles CO3 Apply cryptographic algorithms and protocols to ensure confidentiality, integrity, and authentication in communication systems. CO4 Demonstrate the ability to use simulation tools (like MATLAB) to implement basic cybersecurity mechanisms and analyze cyber threats in embedded and networked systems.