100% found this document useful (1 vote)
1K views1 page

Cybersecurity Essentials Course Overview

This document outlines the essentials of a cyber security course, including its objectives, outcomes, prerequisites, and units of study. The course aims to help students identify key cyber security components, describe various security levels and categories. It covers topics like cybercrime and its legal perspectives, cyber offenses and how criminals plan attacks, security issues related to mobile and wireless devices, and tools used in cybercrime like phishing and malware. The course also addresses organizational implications of cyber security including costs of cybercrime and security risks of social media for organizations.

Uploaded by

ravikumar rayala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views1 page

Cybersecurity Essentials Course Overview

This document outlines the essentials of a cyber security course, including its objectives, outcomes, prerequisites, and units of study. The course aims to help students identify key cyber security components, describe various security levels and categories. It covers topics like cybercrime and its legal perspectives, cyber offenses and how criminals plan attacks, security issues related to mobile and wireless devices, and tools used in cybercrime like phishing and malware. The course also addresses organizational implications of cyber security including costs of cybercrime and security risks of social media for organizations.

Uploaded by

ravikumar rayala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
  • Course Pre-requisites: Lists foundational knowledge needed before engaging with cyber security courses, aiding students in preparation.
  • Course Outcomes: Details expected student achievements upon completing the course, highlighting competencies in cyber defense and security management.
  • Course Objectives: Describes the aims of the course, including the digital security skills and awareness students will develop.

VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY

B. Tech. VII Semester L T/P/D C


3 0 3
5
(18OE1IT01) ESSENTIALS OF CYBER SECURITY

COURSE PRE-REQUISITES: Fundamentals of Computer Networks, Cryptography and Network


Security
10 COURSE OBJECTIVES:
• • Identify the key components of cyber security in network
• • Describe various security levels and categories, operating system security
• • Define authentication issues and network security
• • Describe memory management and protection measures
15
COURSE OUTCOMES: After completion of the course, the student should be able to
CO-1: Categorize cyber-crime and an understand social, political, ethical and psychological dimensions
cyber security
CO-2: Demonstrate security levels and models with objects and access control
20 CO-3: Analyse tools and methods used in cybercrime
CO-4: Understand Organizational Implications and security risks

UNIT – I:
Introduction to Cybercrime: Introduction, Cybercrime, and Information Security, Who are
25 Cybercriminals, Classifications of Cybercrimes, And Cybercrime: The legal Perspectives and Indian
Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes.
UNIT – II:
Cyber Offenses: How Criminals Plan Them: Introduction, How Criminals plan the Attacks, Social
Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack Vector,
30 Cloud Computing.
UNIT – III:
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices,
Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security Challenges Posed
by Mobile Devices, Registry Settings for Mobile Devices, Authentication service Security, Attacks on
35 Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations, Organizational Measures for
Handling Mobile, Organizational Security Policies an Measures in Mobile Computing Era, Laptops.
UNIT – IV:
Tools and Methods Used in Cybercrime: Introduction, Proxy Servers and Anonymizers, Phishing,
Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan Horse and Backdoors,
40 Steganography, DoS and DDoS attacks, SQL Injection, Buffer Overflow.
UNIT – V:
Cyber Security: Organizational Implications Introduction, Cost of Cybercrimes and IPR issues, Web
threats for Organizations, Security and Privacy Implications.
UNIT – VI:
45 Social Media Marketing: Security Risks and Perils for Organizations, Social Computing and the
associated challenges for Organizations.
TEXT BOOKS:
1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Nina
Godbole and Sunil Belapure, Wiley India
50
REFERENCES:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC Press
2. Introduction to Cyber Security, Chwan-Hwa (John) Wu, J. David Irwin, CRC Press T&F Group

You might also like