Uploaded by Sibtain Tahir

Cyber Security

advertisement
Title
Cyber Security
Code
IT-427
Instructor Name
3
Theory/week:
Weight
Contact Hours
Lectures:
Duration
Credit Hours
Prerequisite
3 Cr. Hrs.
3 Hrs.
2
1.5 Hrs.
None
Prerequisite
o Students have concepts of computer Networks and Information
Skill/Knowledge/
Security
Understanding
Category
IT-Core

Course Goals

The course will provide the student with an understanding of the
principles of Cyber security management that are commonly used
in business.
It will introduce the student to commonly used frameworks and
methods and explore critically the suitability and appropriateness of
these for addressing today's organizational security needs.

The successful participant will:

have an understanding of the key themes and principles of
information security management and be able to apply these
principles in designing solutions to managing security risks
effectively;

Security+ Guide to Network Security Fundamentals by Mark
Ciampa, th Edition
Reference
Books/Material

Corporate Computer Society by Randall J.Boyle, 3rd Edition
Instructional
Aids/Resources
None
Learning
Outcomes
Text Book/s
Sessional
25%
Quizzes
05
Project
10
Assignment and
Presentations
05
Assessment
Criteria
Recommendatio
ns
1,2
02
3,4
03
5,6
04
7,8
05
Final
50%
Paper
50
Total
100%
Project/Presentation is the compulsory part of this Course.
Marks division for sectional or project may vary on the basis of
complexity of project or available time for project execution and
documentation.
TOPICS
Source (BookChapter No)
Fundamental concepts of Security, Types of
Attacks, Social Engineering Attacks
1,Handouts
Handout
Week# Lecture #
01
Mid
25%
Paper:
25






Classification traits of malwares
Circulation, Infection, Concealment
Payload capabilities
2



Web Application Attacks
SQL injection
Cross Site Scripting
2
Client Side Attacks
Cookies
Dos, Man in the Middle ,Replay
2


9,10
3

Developing Security Policy
Deploy and manage Security
settings.
Security Through Design
4
06
11,12


Security Through Anti Malware
Fundamentals of Cryptography
07
13,14


OSI Reference Model
AES
08
15,16


Standard Network Devises
Revision
4,5
6
MID Term
09
17,18


Network Security Hardware
Firewalls, Types of Firewalls
7


10
11
19,20
21,22
12
23,24
13
25,26
14
27,28
15
29,30
16
31,32
Spam Filters
Virtual Private Networks
Intrusion Detection and Prevention




Network Address Translation (NAT)
Network Access Control (NAC)
Network Protocols
TCP/IP








DNS
FTP
IPV6
Telnet
NetBIOS
7,8
7,8
8
Wireless Network Security
Wireless Network Attacks
Types of Attacks
9

Mobile Devices Security
10

Cloud Security Challenges and
Solution
IOT security Challenges

Presentations and its evaluation
Final Exam
10,11
Download