UNIT-I Concept of Cyberspace: Netizens Technology, Law and Society Object, Scope of the Information Technology Act, 2000, Electronic Records and Electronic Commerce. Intrusion Detection System, Intrusion Prevention System, Public Key Infrastructure.
UNIT-II Internet Security: Computer Security and Threats, Hacking, Cracking, sneaking, Viruses, Trojan Horses, malicious code, Worms and Logic Bombs. Network attack and Defense Most Common Attacks, Scripts Kiddies and Packaged Defense.
UNIT-III Wireless Network Security: Wireless Network Components, Security issues in Wireless Networks, Securing a Wireless Network, Mobile Security, The Smartphone Pentest Framework UNIT-IV Cyber Laws and Standards: ISO 27001, Cyber Law (Information Technology Act, 2000), International Standards maintained for Cyber Security, Security Audit, Investigation by Investing Agency, Cyber Security Solutions.
UNIT-V Security Management: Disaster Recovery, Digital Signature, Ethical Hacking, Penetration Testing, Computer Forensics
Referential Books:
1. GautamKumawat, Ethical Hacking & Cyber Security Course : A Complete Package, Udemy Course, 2017
2. Georgia Weidman , Penetration testing A Hands-On In t r o d u c t i o n to Hacking, no starch press, 2014
3. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th Edition , Pearson Education , 2015
4. William Stallings-Cryptography and Network Security: Principles and Practice Publication
- Teacher: Mamata Panda