HEAD
Introduction to Blockchain:Need for Distributed Record Keeping,Blockchain architecture, blockheader detailed design, Abstract Models for Blockchain, Proof of Work ( PoW), liveness and fairness, Proof of Stake ( PoS) based Chains, Hybrid models ( PoW + PoS); Types of Blockchain..
Blockchain Consensus Algorithm challenges and solutions,Modeling faults and adversaries,Byzantine Models of Fault tolerance;Zero Knowledge proofs and protocols in Blockchain.
Introduction to cryptographic basics for cryptocurrency - a short description of Hashing, digital signature schemes, encryption schemes and elliptic curve cryptography, verifiable random functions.
Blockchain 2.0: Introduction to Ethereum, Ethereum Virtual Machine (EVM), Wallets for Ethereum, Solidity, Smart Contracts, Attacks on smart contracts, The Turing Completeness of Smart Contract Languages and verification challenges. Blockchain 3.0: Hyperledger implementation on Ethereum,the plug and play platform and mechanisms in permissioned blockchain.
Application of Blockchain:Bitcoin- Bitcoin consensus, Wallet, Bitcoin Blocks, Merkley Tree, hardness of mining, transaction verifiability, anonymity, forks, double spending, mathematical analysis of properties of Bitcoin. Altcoins. Medical record management systems, DNS records.
Josh Thompson, ‘Blockchain: The Blockchain for Beginnings, Guilde to Blockchain Technology and Blockchain Programming’, Create Space Independent Publishing Platform, 2017.
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder, ‘Bitcoin and cryptocurrency technologies: a comprehensive introduction’, Princeton University Press, 2016.
Kumar Saurabh, AshutoshSaxena, ‘Blockchain Technology: Concepts and Applications’, Wiley, 2020.
IS 502- Database Management Systems
Describe design of a database at various levels and compare andcontrast traditional data processing with DBMS.
Design a database using Entity Relationship diagram and other design techniques.
Apply fundamentals of relational model to model and implement a sample Database Management System for a given domain.
Evaluate and optimize queries and apply concepts of transaction management.
i.e. Tuple oriented and domain oriented relational calculus and its operations.
UNIT III: Data Base Design: Introduction to normalization, Normal forms- 1NF, 2NF, 3NF and BCNF, Functional dependency, Decomposition, Dependency preservation and lossless join, problems with null valued and dangling tuples, multivalued dependencies. Query Optimization: Introduction, steps
of optimization, various algorithms to implement select, project and join operations of relational algebra, optimization methods: heuristic based, cost estimation based.
/MySQL: Architecture, physical files, memory structures, background process. Data dictionary, dynamic performance view. Security, role management, privilege management, profiles, invoker defined security model. SQL queries, Hierarchical quires, inline queries, flashback queries. Introduction of ANSI SQL, Cursor management: nested and parameterized cursors. Stored procedures, usage of parameters in procedures. User defined functions their limitations. Triggers, mutating errors, instead of triggers.
TEXT BOOKS RECOMMENDED:
Korth H.F. &Silberschatz A., Sudarshan, “Database Systems”, McGraw-Hill
Chris J. Date, with Hugh Darwin, Addison-Wesley, “A Guide to SQL Standard”.
Elmasri R., Navathe S.B., “Fundamentals of Database Systems”, Pearson.
REFERENCE BOOKS:
Rob, “ Database System: Design Implementation & Management”, Cengage Learning.
AtulKahate , “Introduction to Database Management System”, Pearson Educations
Oracle 9i Database Administration Fundamental-I, Volume I, Oracle Press, TMH.
Paneerselvam,”Database Management System”, PHI Learning
New Scheme Based On AICTE Flexible Curricula
To apply contingency strategies including data backup and recovery and alternate site selection for business resumption planning
To Skilled to be able to describe the escalation process from incident to disaster in case of security disaster.
To Design a Disaster Recovery Plan for sustained organizational operations.
Describe the concepts of risk management in information security Define and differentiate various Contingency Planning components. Define and be able to discuss incident response options, and design an Incident Response Plan for sustained organizational operations.
SECURITY BASICS: Information Security (INFOSEC) Overview: critical information characteristics – availability information states – processing security countermeasures-education, training and awareness, critical information characteristics – confidentiality critical information characteristics – integrity, information states – storage, information states – transmission, security countermeasurespolicy, procedures and practices, threats, vulnerabilities.
Threats to and Vulnerabilities of Systems: Threats, major categories of threats (e.g.,
fraud, Hostile Intelligence Service (HOIS). Countermeasures: assessments (e.g., surveys, inspections). Concepts of Risk Management: consequences (e.g., corrective action, risk assessment), cost/benefit analysis and implementation of controls, monitoring the efficiency and effectiveness of controls (e.g., unauthorized or inadvertent disclosure of information).
Security Planning: directives and procedures for policy mechanism. Contingency Planning/Disaster Recovery: agency response procedures and continuity of operations, contingency plan components, determination of backup requirements, development of plans for recovery actions after a disruptive event.
Personnel Security Practices and Procedures: access authorization/verification (need- to-know), contractors, employee clearances, position sensitivity, security training and awareness, systems
maintenance personnel.
Auditing and Monitoring: conducting security reviews, effectiveness of security programs, investigation of security breaches, privacy review of accountability controls, review of audit trails and logs.
Operations Security (OPSEC): OPSEC surveys/OPSEC planning INFOSEC: computer security – audit, cryptography-encryption (e.g., point-to-point, network, link). Case study of threat and vulnerability assessment.
Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best Practices, Nina Godbole, John Wiley & Sons.
Principles of Incident Response and Disaster Recovery, Whitman & Mattord, Course Technology ISBN: 141883663X.
Introduction to Cyber Security, https://swayam.gov.in/nd2_nou20_cs01/preview
(Web Link) http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
Software Product and Process Characteristics, Software Process Models: Linear Sequential Model, Prototyping Model, RAD Model, Evolutionary Process Models like Incremental Model, Spiral Model, Component Assembly Model, RUP and Agile processes. Software Process customization and improvement, CMM, Product and Process Metrics
Functional and Non-functional requirements, Requirement Sources and Elicitation Techniques, Analysis Modeling for Function-oriented and Object-oriented software development, Use case Modeling, System and Software Requirement Specifications, Requirement Validation, Traceability
The Software Design Process, Design Concepts and Principles, Software Modeling and UML, Architectural Design, Architectural Views and Styles, User Interface Design, Function- oriented Design, SA/SD Component Based Design, Design Metrics.
Software Static and Dynamic analysis, Code inspections, Software Testing, Fundamentals, Software Test Process, Testing Levels, Test Criteria, Test Case Design, Test Oracles, Test Techniques, Black- Box Testing, White-Box Unit Testing and Unit, Testing Frameworks, Integration Testing, System Testing and other Specialized, Testing, Test Plan, Test Metrics, Testing Tools. , Introduction to Object-oriented analysis, design and comparison with structured Software Engg.
Need and Types of Maintenance, Software Configuration Management (SCM), Software Change Management, Version Control, Change control and Reporting, Program Comprehension Techniques, Re-engineering, Reverse Engineering, Tool Support. Project Management Concepts, Feasibility Analysis, Project and Process Planning, Resources Allocations, Software efforts, Schedule, and Cost estimations, Project Scheduling and Tracking, Risk Assessment and Mitigation, Software Quality Assurance (SQA). Project Plan, Project Metrics.
Pressman R.S., “Software Engineering – A Practitioners Approach”, McGraw Hill.
Sommerville, “Software Engineering”, Pearson Education
Pankaj Jalote, “An Integrated Approach to Software Engineering”, Narosa Publishing House.
Stephen Schach, “Software Engineering”, Tata McGraw Hill.
Waman S. Jawadekar, “Software Engineering – Principles and Practice”, McGraw Hill.
Stephen H. Kan, “Matrix and Models in Software Quality Engineering”, Addison Wesley.
UNIT: 1 Introduction to E-commerce: Operating System Services, Advantages and Disadvantages of E – Commerce, Developer Services, Data Services, Application Services, Store Services, Client Services, Types of E Commerce Solutions- Direct Marketing and Selling, Supply Chain Integration, Corporate Procurement.
UNIT: 2 Business Models for E-Commerce: E-Business models based on Relationship of Transaction Parties, Brokerage Model, Aggregator Model, Info-mediary model, Community Model, Value chain model, Manufacturer model, Advertising Model, Subscription model, E- Marketing – Identifying Web Presence Goals, BowsingBehaviour Model, Building Customer Relationship Based on One – to – One Marketing, E – branding, Elements of Branding, Spiral Branding.
UNIT:3 Electronic Data Interchange: Evolution, uses, Benefits, Working of EDI,EDIStandards(includes variable length EDI standards),Cost Benefit Analysis of EDI, ElectronicTrading Networks, EDI Components, File Types ,EDI Services,EDI Software, Business Approach of EDI, EDIFACT( Overview, Structure, EDIFACTSoftware),Business Future of EDI,EDI Administration.EDI Security, Digital signatures, Digital Certificates, Cryptography export restrictions, Secure Sockets Layer(SSL), Secure Electronic Transactions (SET),Smart Cards and its applications, WAP, WAP Architecture, WAP Programming Model.
UNIT: 4 Electronic Payment Security: Electronic Payment Systems – Electronic Commerce, Offline Versus Online, Debit Versus Credit, Macro versus Micro, Payment Instrument, Electronic Wallet, Smart Cards, Electronic Payment Security. Payment Security Services – Payment Transaction Security, Digital Money Security, Electronic Check Security, Availability and Reliability, Electronic Payment Framework.
UNIT: 5 Security on the Web&Mobile : Network and Website Security Risks, HTTP Cache Security Issues, HTTP Client Authentication, Web Transaction Security, Web Server Security, Web Client Security, Mobile Agent Security – mobile Agents, Security Issues, Protecting Platforms from Hostile Agents, Smart Card Security, Firewall Concept, Firewall Components, Benefits of an Internet Firewall, Enterprise-Wide Security Framework, Secure Physical Infrastructure.
References:
E-Commerce: Fundamentals and Applications, Henry Chan, Wiley India
E-Commerce An Indian Perspective, P.T.Joseph, S.J., PHI.
Electronic Commerce: Greenstein, Merylin, Tata Mc.Graw Hill.
E-Commerce Business.Technology. Society, Kenneth C. Laudon, Carol Guerico Traver, Pearson Education.
CyberOps Associate students should have the following skills and knowledge:
PC and internet navigation skills
Basic Windows and Linux system concepts
Basic understanding of computer networks
Binary and Hexadecimal understanding
Course Outcome :
Upon completion of the course, students will be able to perform the following tasks:
Explain the role of the Cybersecurity Operations Analyst in the enterprise.
Analyze the operation of network protocols and services.
Explain the operation of the network infrastructure.
Classify the various types of network attacks.
Use network monitoring tools to identify attacks against network protocols and services.
Evaluate network security alerts.
Analyze network intrusion data to identify compromised hosts.
Cybersecurity incidents, Threat actors, network security attacks, security operations center, security features of the Windows & Linux operating systems, Linux file system and permissions.
Network Security Infrastructure : Network Topologies, Security Devices, Security Services, Network Attacks, types of attack tools used by Threat Actors. Network Monitoring and Tools.
TCP/IP vulnerabilities : IP PDU Details, TCP and UDP Vulnerabilities, IP service vulnerabilities, network security defense : Defense-in-Depth, Security Policies, Regulations, and Standards,
Network Protection : Access Control Concepts, AAA usage and operation, Threat Intelligence : Information Sources, Threat Intelligence Services, Endpoint Protection : Antimalware Protection, Host-based Intrusion Prevention, Application Security.
Endpoint Vulnerability Assessment, Network and Server Profiling, Common Vulnerability Scoring System (CVSS), Information Security Management Systems, Network Security Data, Evaluating Alerts, Cyber Kill Chain, Diamond Model of Intrusion Analysis,
Cybersecurity Operations Companion Guide by Cisco Networking Academy, Cisco Press 2018
Cybersecurity Operations Handbook by Bill Hancock, John W. Rittinghouse, and William M. Hancock, PhD, CISSP, CISM, Elsevier Science
Security Operations Center: Building, Operating, and Maintaining Your SOC by Gary McIntyre, Joseph Muniz, and Nadhem AlFardan, Cisco Press.
Unit I :
Introduction to Digital Forensics, Physical Vs Cyber crime, Digital Vs Physical Evidence, Nature of Digital Evidence, Preservation of Digital Evidence, Challenging aspects of Digital Evidence, Digital Devices; Principles of Digital Forensics, Digital Forensic Investigation, Investigation Models.
Unit II :
Data and Evidence Recovery: Seizure of digital Evidence- Issues, methodology, factors limiting wholesale seizure, pulling the plug or not; Data objects, Storage Media, Variety of data, Recovered data objects, electronic evidence- secure boot and write blockers, disk file organization, disk and file imaging recovering techniques.
Unit III :
Mobile and Live Forensics Investigations: Mobile phone forensics- Mobile device characteristics, memory considerations, tools classification, flasher boxes, obstructed devices; Forensics procedures- preservation, acquisition, examination and analysis, reporting; SIM Card Forensics.
Unit IV:
Network Forensics: Sources of network based evidences, procedure for applying network based forensics, digital evidence on internet, digital evidence on physical and data link layers, digital evidence at the network and transport layers.
Unit V:
Case Study of Data recovery and Forensic tools: FTK, Encase, Mini tool, Win-LiFT, SIMXtractor etc., Memory dump tools like: windddumpIt etc.
Ibrahim Baggili, Digital Forensics and Cyber Crime, Springer.
W. Kruse and J. Heiser, Computer Forensics: Incident Response Essentials, Massachusetts, Ed. Boston, Addision Wesley.
Rick Ayers, Sam Brothers and Wayne Jansen, Guidelines on Mobile Device Forensics, NIST, 2014.
The Indian Cyber law with Cyber glossary, Suresh T. Vishwanathan, New Delhi, Bhart Law House, 2000.
Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives, Nina Godbole, Sunit Belapure, Wiley India
Law of Cyber Crimes and Information Technology Law, S.V. JogaRao, 2007.
Cyber Law, Cyber Crime Internet and E-Commerce, Vimlendu Tayal.
Information Technology Law and Practice, Vakul Sharma.
Introduction to Blockchain:Need for Distributed Record Keeping,Blockchain architecture, blockheader detailed design, Abstract Models for Blockchain, Proof of Work ( PoW), liveness and fairness, Proof of Stake ( PoS) based Chains, Hybrid models ( PoW + PoS); Types of Blockchain..
Blockchain Consensus Algorithm challenges and solutions,Modeling faults and adversaries,Byzantine Models of Fault tolerance;Zero Knowledge proofs and protocols in Blockchain.
Introduction to cryptographic basics for cryptocurrency - a short description of Hashing, digital signature schemes, encryption schemes and elliptic curve cryptography, verifiable random functions.
Blockchain 2.0: Introduction to Ethereum, Ethereum Virtual Machine (EVM), Wallets for Ethereum, Solidity, Smart Contracts, Attacks on smart contracts, The Turing Completeness of Smart Contract Languages and verification challenges. Blockchain 3.0: Hyperledger implementation on Ethereum,the plug and play platform and mechanisms in permissioned blockchain.
Application of Blockchain:Bitcoin- Bitcoin consensus, Wallet, Bitcoin Blocks, Merkley Tree, hardness of mining, transaction verifiability, anonymity, forks, double spending, mathematical analysis of properties of Bitcoin. Altcoins. Medical record management systems, DNS records.
Josh Thompson, ‘Blockchain: The Blockchain for Beginnings, Guilde to Blockchain Technology and Blockchain Programming’, Create Space Independent Publishing Platform, 2017.
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder, ‘Bitcoin and cryptocurrency technologies: a comprehensive introduction’, Princeton University Press, 2016.
Kumar Saurabh, AshutoshSaxena, ‘Blockchain Technology: Concepts and Applications’, Wiley, 2020.
IS 502- Database Management Systems
Describe design of a database at various levels and compare andcontrast traditional data processing with DBMS.
Design a database using Entity Relationship diagram and other design techniques.
Apply fundamentals of relational model to model and implement a sample Database Management System for a given domain.
Evaluate and optimize queries and apply concepts of transaction management.
i.e. Tuple oriented and domain oriented relational calculus and its operations.
UNIT III: Data Base Design: Introduction to normalization, Normal forms- 1NF, 2NF, 3NF and BCNF, Functional dependency, Decomposition, Dependency preservation and lossless join, problems with null valued and dangling tuples, multivalued dependencies. Query Optimization: Introduction, steps
of optimization, various algorithms to implement select, project and join operations of relational algebra, optimization methods: heuristic based, cost estimation based.
/MySQL: Architecture, physical files, memory structures, background process. Data dictionary, dynamic performance view. Security, role management, privilege management, profiles, invoker defined security model. SQL queries, Hierarchical quires, inline queries, flashback queries. Introduction of ANSI SQL, Cursor management: nested and parameterized cursors. Stored procedures, usage of parameters in procedures. User defined functions their limitations. Triggers, mutating errors, instead of triggers.
TEXT BOOKS RECOMMENDED:
Korth H.F. &Silberschatz A., Sudarshan, “Database Systems”, McGraw-Hill
Chris J. Date, with Hugh Darwin, Addison-Wesley, “A Guide to SQL Standard”.
Elmasri R., Navathe S.B., “Fundamentals of Database Systems”, Pearson.
REFERENCE BOOKS:
Rob, “ Database System: Design Implementation & Management”, Cengage Learning.
AtulKahate , “Introduction to Database Management System”, Pearson Educations
Oracle 9i Database Administration Fundamental-I, Volume I, Oracle Press, TMH.
Paneerselvam,”Database Management System”, PHI Learning
New Scheme Based On AICTE Flexible Curricula
To apply contingency strategies including data backup and recovery and alternate site selection for business resumption planning
To Skilled to be able to describe the escalation process from incident to disaster in case of security disaster.
To Design a Disaster Recovery Plan for sustained organizational operations.
Describe the concepts of risk management in information security Define and differentiate various Contingency Planning components. Define and be able to discuss incident response options, and design an Incident Response Plan for sustained organizational operations.
SECURITY BASICS: Information Security (INFOSEC) Overview: critical information characteristics – availability information states – processing security countermeasures-education, training and awareness, critical information characteristics – confidentiality critical information characteristics – integrity, information states – storage, information states – transmission, security countermeasurespolicy, procedures and practices, threats, vulnerabilities.
Threats to and Vulnerabilities of Systems: Threats, major categories of threats (e.g.,
fraud, Hostile Intelligence Service (HOIS). Countermeasures: assessments (e.g., surveys, inspections). Concepts of Risk Management: consequences (e.g., corrective action, risk assessment), cost/benefit analysis and implementation of controls, monitoring the efficiency and effectiveness of controls (e.g., unauthorized or inadvertent disclosure of information).
Security Planning: directives and procedures for policy mechanism. Contingency Planning/Disaster Recovery: agency response procedures and continuity of operations, contingency plan components, determination of backup requirements, development of plans for recovery actions after a disruptive event.
Personnel Security Practices and Procedures: access authorization/verification (need- to-know), contractors, employee clearances, position sensitivity, security training and awareness, systems
maintenance personnel.
Auditing and Monitoring: conducting security reviews, effectiveness of security programs, investigation of security breaches, privacy review of accountability controls, review of audit trails and logs.
Operations Security (OPSEC): OPSEC surveys/OPSEC planning INFOSEC: computer security – audit, cryptography-encryption (e.g., point-to-point, network, link). Case study of threat and vulnerability assessment.
Information Systems Security, 2ed: Security Management, Metrics, Frameworks and Best Practices, Nina Godbole, John Wiley & Sons.
Principles of Incident Response and Disaster Recovery, Whitman & Mattord, Course Technology ISBN: 141883663X.
Introduction to Cyber Security, https://swayam.gov.in/nd2_nou20_cs01/preview
(Web Link) http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
Software Product and Process Characteristics, Software Process Models: Linear Sequential Model, Prototyping Model, RAD Model, Evolutionary Process Models like Incremental Model, Spiral Model, Component Assembly Model, RUP and Agile processes. Software Process customization and improvement, CMM, Product and Process Metrics
Functional and Non-functional requirements, Requirement Sources and Elicitation Techniques, Analysis Modeling for Function-oriented and Object-oriented software development, Use case Modeling, System and Software Requirement Specifications, Requirement Validation, Traceability
The Software Design Process, Design Concepts and Principles, Software Modeling and UML, Architectural Design, Architectural Views and Styles, User Interface Design, Function- oriented Design, SA/SD Component Based Design, Design Metrics.
Software Static and Dynamic analysis, Code inspections, Software Testing, Fundamentals, Software Test Process, Testing Levels, Test Criteria, Test Case Design, Test Oracles, Test Techniques, Black- Box Testing, White-Box Unit Testing and Unit, Testing Frameworks, Integration Testing, System Testing and other Specialized, Testing, Test Plan, Test Metrics, Testing Tools. , Introduction to Object-oriented analysis, design and comparison with structured Software Engg.
Need and Types of Maintenance, Software Configuration Management (SCM), Software Change Management, Version Control, Change control and Reporting, Program Comprehension Techniques, Re-engineering, Reverse Engineering, Tool Support. Project Management Concepts, Feasibility Analysis, Project and Process Planning, Resources Allocations, Software efforts, Schedule, and Cost estimations, Project Scheduling and Tracking, Risk Assessment and Mitigation, Software Quality Assurance (SQA). Project Plan, Project Metrics.
Pressman R.S., “Software Engineering – A Practitioners Approach”, McGraw Hill.
Sommerville, “Software Engineering”, Pearson Education
Pankaj Jalote, “An Integrated Approach to Software Engineering”, Narosa Publishing House.
Stephen Schach, “Software Engineering”, Tata McGraw Hill.
Waman S. Jawadekar, “Software Engineering – Principles and Practice”, McGraw Hill.
Stephen H. Kan, “Matrix and Models in Software Quality Engineering”, Addison Wesley.
UNIT: 1 Introduction to E-commerce: Operating System Services, Advantages and Disadvantages of E – Commerce, Developer Services, Data Services, Application Services, Store Services, Client Services, Types of E Commerce Solutions- Direct Marketing and Selling, Supply Chain Integration, Corporate Procurement.
UNIT: 2 Business Models for E-Commerce: E-Business models based on Relationship of Transaction Parties, Brokerage Model, Aggregator Model, Info-mediary model, Community Model, Value chain model, Manufacturer model, Advertising Model, Subscription model, E- Marketing – Identifying Web Presence Goals, BowsingBehaviour Model, Building Customer Relationship Based on One – to – One Marketing, E – branding, Elements of Branding, Spiral Branding.
UNIT:3 Electronic Data Interchange: Evolution, uses, Benefits, Working of EDI,EDIStandards(includes variable length EDI standards),Cost Benefit Analysis of EDI, ElectronicTrading Networks, EDI Components, File Types ,EDI Services,EDI Software, Business Approach of EDI, EDIFACT( Overview, Structure, EDIFACTSoftware),Business Future of EDI,EDI Administration.EDI Security, Digital signatures, Digital Certificates, Cryptography export restrictions, Secure Sockets Layer(SSL), Secure Electronic Transactions (SET),Smart Cards and its applications, WAP, WAP Architecture, WAP Programming Model.
UNIT: 4 Electronic Payment Security: Electronic Payment Systems – Electronic Commerce, Offline Versus Online, Debit Versus Credit, Macro versus Micro, Payment Instrument, Electronic Wallet, Smart Cards, Electronic Payment Security. Payment Security Services – Payment Transaction Security, Digital Money Security, Electronic Check Security, Availability and Reliability, Electronic Payment Framework.
UNIT: 5 Security on the Web&Mobile : Network and Website Security Risks, HTTP Cache Security Issues, HTTP Client Authentication, Web Transaction Security, Web Server Security, Web Client Security, Mobile Agent Security – mobile Agents, Security Issues, Protecting Platforms from Hostile Agents, Smart Card Security, Firewall Concept, Firewall Components, Benefits of an Internet Firewall, Enterprise-Wide Security Framework, Secure Physical Infrastructure.
References:
E-Commerce: Fundamentals and Applications, Henry Chan, Wiley India
E-Commerce An Indian Perspective, P.T.Joseph, S.J., PHI.
Electronic Commerce: Greenstein, Merylin, Tata Mc.Graw Hill.
E-Commerce Business.Technology. Society, Kenneth C. Laudon, Carol Guerico Traver, Pearson Education.
CyberOps Associate students should have the following skills and knowledge:
PC and internet navigation skills
Basic Windows and Linux system concepts
Basic understanding of computer networks
Binary and Hexadecimal understanding
Course Outcome :
Upon completion of the course, students will be able to perform the following tasks:
Explain the role of the Cybersecurity Operations Analyst in the enterprise.
Analyze the operation of network protocols and services.
Explain the operation of the network infrastructure.
Classify the various types of network attacks.
Use network monitoring tools to identify attacks against network protocols and services.
Evaluate network security alerts.
Analyze network intrusion data to identify compromised hosts.
Cybersecurity incidents, Threat actors, network security attacks, security operations center, security features of the Windows & Linux operating systems, Linux file system and permissions.
Network Security Infrastructure : Network Topologies, Security Devices, Security Services, Network Attacks, types of attack tools used by Threat Actors. Network Monitoring and Tools.
TCP/IP vulnerabilities : IP PDU Details, TCP and UDP Vulnerabilities, IP service vulnerabilities, network security defense : Defense-in-Depth, Security Policies, Regulations, and Standards,
Network Protection : Access Control Concepts, AAA usage and operation, Threat Intelligence : Information Sources, Threat Intelligence Services, Endpoint Protection : Antimalware Protection, Host-based Intrusion Prevention, Application Security.
Endpoint Vulnerability Assessment, Network and Server Profiling, Common Vulnerability Scoring System (CVSS), Information Security Management Systems, Network Security Data, Evaluating Alerts, Cyber Kill Chain, Diamond Model of Intrusion Analysis,
Cybersecurity Operations Companion Guide by Cisco Networking Academy, Cisco Press 2018
Cybersecurity Operations Handbook by Bill Hancock, John W. Rittinghouse, and William M. Hancock, PhD, CISSP, CISM, Elsevier Science
Security Operations Center: Building, Operating, and Maintaining Your SOC by Gary McIntyre, Joseph Muniz, and Nadhem AlFardan, Cisco Press.
Unit I :
Introduction to Digital Forensics, Physical Vs Cyber crime, Digital Vs Physical Evidence, Nature of Digital Evidence, Preservation of Digital Evidence, Challenging aspects of Digital Evidence, Digital Devices; Principles of Digital Forensics, Digital Forensic Investigation, Investigation Models.
Unit II :
Data and Evidence Recovery: Seizure of digital Evidence- Issues, methodology, factors limiting wholesale seizure, pulling the plug or not; Data objects, Storage Media, Variety of data, Recovered data objects, electronic evidence- secure boot and write blockers, disk file organization, disk and file imaging recovering techniques.
Unit III :
Mobile and Live Forensics Investigations: Mobile phone forensics- Mobile device characteristics, memory considerations, tools classification, flasher boxes, obstructed devices; Forensics procedures- preservation, acquisition, examination and analysis, reporting; SIM Card Forensics.
Unit IV:
Network Forensics: Sources of network based evidences, procedure for applying network based forensics, digital evidence on internet, digital evidence on physical and data link layers, digital evidence at the network and transport layers.
Unit V:
Case Study of Data recovery and Forensic tools: FTK, Encase, Mini tool, Win-LiFT, SIMXtractor etc., Memory dump tools like: windddumpIt etc.
Ibrahim Baggili, Digital Forensics and Cyber Crime, Springer.
W. Kruse and J. Heiser, Computer Forensics: Incident Response Essentials, Massachusetts, Ed. Boston, Addision Wesley.
Rick Ayers, Sam Brothers and Wayne Jansen, Guidelines on Mobile Device Forensics, NIST, 2014.
The Indian Cyber law with Cyber glossary, Suresh T. Vishwanathan, New Delhi, Bhart Law House, 2000.
Cyber Security: Understanding Cyber Crimes, Computer Forensics And Legal Perspectives, Nina Godbole, Sunit Belapure, Wiley India
Law of Cyber Crimes and Information Technology Law, S.V. JogaRao, 2007.
Cyber Law, Cyber Crime Internet and E-Commerce, Vimlendu Tayal.
Information Technology Law and Practice, Vakul Sharma.