SlideShare a Scribd company logo
1 of 2
Download to read offline
Program
Name
B.Sc./B.C.A Semester V
Course Title Cyber Security(Theory)
Course Code: SEC-5 No. of Credits 03
Contact hours 30Hrs Duration of SEA/Exam 01hrs
Formative Assessment
Marks 25 Summative Assessment Marks 25
Course Outcomes(COs):After the successful completion of the course, the student will be able to:
CO1 After completion of this course, students would be able to understand the concept of
Cyber security and issues and challenges associated with it.
CO2 Students, at the end of this course, should be able to understand the cyber crimes, their
nature, legal remedies and as to how report the crimes through available platforms and
procedures.
CO3 On completion of this course, students should be able to appreciate various privacy and
security concerns on online Social media and understand the reporting procedure of
inappropriate content, underlying legal aspects and best practices for the use of Social
media platforms.
Contents 30Hrs
Module-I. Introduction to Cyber security: Defining Cyberspace and Overview of
Computer and Web-technology, Architecture of cyberspace, Communication and web
technology, Internet, World wide web, Advent of internet, Internet infrastructure for data
transfer and governance, Internet society, Regulation of cyberspace, Concept ofcyber
security, Issues and challenges of cyber security.
10
Module-II .Cyber crime and Cyber law:Classification of cyber crimes, Common cyber
crimes- cyber crime targeting computers and mobiles, cyber crime against women and
children, financial frauds, social engineering attacks, malware and ransomware attacks,
zero day and zero click attacks, Cybercriminals modus-operandi, Reporting of cyber
crimes, Remedial and mitigation measures, Legal perspective of cyber crime, IT Act 2000
and its amendments, Cyber crime and offences, Organisations dealing with Cyber crime
and Cyber security in India, Case studies.
10
Module III. Social Media Overview and Security: Introduction to Social networks. Types
of Social media, Social media platforms, Social media monitoring, Hashtag, Viral content,
Social media marketing, Social media privacy, Challenges, opportunities and pitfalls in
online social network, Security issues related to social media, Flagging and reporting of
inappropriate content, Laws regarding posting of inappropriate content, Best practices for
the use of Social media, Case studies.
10
Course Articulation Matrix: Mapping of Course Outcomes (COs) with Program Outcomes
Course Out comes(COs) /Program
Outcomes (POs)
Program Outcomes (POs)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
Quickly understand the given problem
and come up with the correct answer
Identify, construct and compute numerical
situations by work with numbers
Conceive and develop a methodology for
analyzing data and solving a problem.
Define, modify and apply critical thinking
to real time situations.
Pedagogy: Problem Solving
Formative Assessment for Theory
Assessment Occasion/type Marks
Internal Test1 30%
Assignment/Surprise Test 20%
Total 25Marks
Formative Assessment as per guidelines.
Text/References
1
Cyber Crime Impact in the New Millennium, by R. C Mishra , Auther Press. Edition 2010
2 Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit
Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011)
3 Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver,
Create Space Independent Publishing Platform. (Pearson , 13th
November, 2001)
4 Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers.
5 Fundamentals of Network Security by E. Maiwald, McGraw Hill.
6 Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition,
Wiley India Pvt. Ltd.

More Related Content

Similar to CyberSecuritySyllabus.pdf

computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
ma7808766
 
Assessment in microblogging enhanced courses
Assessment in microblogging enhanced coursesAssessment in microblogging enhanced courses
Assessment in microblogging enhanced courses
Carmen Holotescu
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
JohnRicos
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
cockekeshia
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
JayaramB11
 
Introduction to research techniques
Introduction to research techniquesIntroduction to research techniques
Introduction to research techniques
Pranav Koolwal
 

Similar to CyberSecuritySyllabus.pdf (20)

Digital Competences Guitert. Digital Empowerment
Digital Competences Guitert. Digital Empowerment Digital Competences Guitert. Digital Empowerment
Digital Competences Guitert. Digital Empowerment
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
computingcomputingcomputingcomputingcomputingcomputingcomputingcomputingcompu...
 
Data and Digital Communication.docx
Data and Digital Communication.docxData and Digital Communication.docx
Data and Digital Communication.docx
 
Assessment in microblogging enhanced courses
Assessment in microblogging enhanced coursesAssessment in microblogging enhanced courses
Assessment in microblogging enhanced courses
 
Ikeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security CompetenciesIkeepsafe Cyber Safety, Ethics and Security Competencies
Ikeepsafe Cyber Safety, Ethics and Security Competencies
 
GCSE year 9 options evening
GCSE year 9 options eveningGCSE year 9 options evening
GCSE year 9 options evening
 
Social Media: Marketing Communications Strategy | 2013/2014 course review
Social Media: Marketing Communications Strategy | 2013/2014 course reviewSocial Media: Marketing Communications Strategy | 2013/2014 course review
Social Media: Marketing Communications Strategy | 2013/2014 course review
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
Workshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future GovernmentWorkshop II on a Roadmap to Future Government
Workshop II on a Roadmap to Future Government
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Teaching Social Media
Teaching Social MediaTeaching Social Media
Teaching Social Media
 
Digital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabusDigital literacy and Citizenship syllabus
Digital literacy and Citizenship syllabus
 
Primary national curriculum_-_computing
Primary national curriculum_-_computingPrimary national curriculum_-_computing
Primary national curriculum_-_computing
 
Introduction to research techniques
Introduction to research techniquesIntroduction to research techniques
Introduction to research techniques
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Sem iii
Sem iiiSem iii
Sem iii
 
Sem iii
Sem iiiSem iii
Sem iii
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 

CyberSecuritySyllabus.pdf

  • 1. Program Name B.Sc./B.C.A Semester V Course Title Cyber Security(Theory) Course Code: SEC-5 No. of Credits 03 Contact hours 30Hrs Duration of SEA/Exam 01hrs Formative Assessment Marks 25 Summative Assessment Marks 25 Course Outcomes(COs):After the successful completion of the course, the student will be able to: CO1 After completion of this course, students would be able to understand the concept of Cyber security and issues and challenges associated with it. CO2 Students, at the end of this course, should be able to understand the cyber crimes, their nature, legal remedies and as to how report the crimes through available platforms and procedures. CO3 On completion of this course, students should be able to appreciate various privacy and security concerns on online Social media and understand the reporting procedure of inappropriate content, underlying legal aspects and best practices for the use of Social media platforms. Contents 30Hrs Module-I. Introduction to Cyber security: Defining Cyberspace and Overview of Computer and Web-technology, Architecture of cyberspace, Communication and web technology, Internet, World wide web, Advent of internet, Internet infrastructure for data transfer and governance, Internet society, Regulation of cyberspace, Concept ofcyber security, Issues and challenges of cyber security. 10 Module-II .Cyber crime and Cyber law:Classification of cyber crimes, Common cyber crimes- cyber crime targeting computers and mobiles, cyber crime against women and children, financial frauds, social engineering attacks, malware and ransomware attacks, zero day and zero click attacks, Cybercriminals modus-operandi, Reporting of cyber crimes, Remedial and mitigation measures, Legal perspective of cyber crime, IT Act 2000 and its amendments, Cyber crime and offences, Organisations dealing with Cyber crime and Cyber security in India, Case studies. 10 Module III. Social Media Overview and Security: Introduction to Social networks. Types of Social media, Social media platforms, Social media monitoring, Hashtag, Viral content, Social media marketing, Social media privacy, Challenges, opportunities and pitfalls in online social network, Security issues related to social media, Flagging and reporting of inappropriate content, Laws regarding posting of inappropriate content, Best practices for the use of Social media, Case studies. 10 Course Articulation Matrix: Mapping of Course Outcomes (COs) with Program Outcomes Course Out comes(COs) /Program Outcomes (POs) Program Outcomes (POs) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Quickly understand the given problem and come up with the correct answer Identify, construct and compute numerical situations by work with numbers
  • 2. Conceive and develop a methodology for analyzing data and solving a problem. Define, modify and apply critical thinking to real time situations. Pedagogy: Problem Solving Formative Assessment for Theory Assessment Occasion/type Marks Internal Test1 30% Assignment/Surprise Test 20% Total 25Marks Formative Assessment as per guidelines. Text/References 1 Cyber Crime Impact in the New Millennium, by R. C Mishra , Auther Press. Edition 2010 2 Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Sumit Belapure and Nina Godbole, Wiley India Pvt. Ltd. (First Edition, 2011) 3 Security in the Digital Age: Social Media Security Threats and Vulnerabilities by Henry A. Oliver, Create Space Independent Publishing Platform. (Pearson , 13th November, 2001) 4 Cyber Laws: Intellectual Property & E-Commerce Security by Kumar K, Dominant Publishers. 5 Fundamentals of Network Security by E. Maiwald, McGraw Hill. 6 Network Security Bible, Eric Cole, Ronald Krutz, James W. Conley, 2nd Edition, Wiley India Pvt. Ltd.