0% found this document useful (0 votes)
29 views6 pages

Syllabus

The syllabus provides an overview of the topics to be covered in the "Microsoft CyberShikshaa 2024" course over 40-45 hours. It includes understanding cyber security concepts like passwords, two-factor authentication, and types of cyber crimes. Specific topics will cover social engineering, malware types, social media safety, cyber bullying, and digital wellness. The syllabus also addresses technical measures like HTTPS, OS security, and cryptography as well as emerging technologies like blockchain and the deep/dark web.

Uploaded by

manomahe0287
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views6 pages

Syllabus

The syllabus provides an overview of the topics to be covered in the "Microsoft CyberShikshaa 2024" course over 40-45 hours. It includes understanding cyber security concepts like passwords, two-factor authentication, and types of cyber crimes. Specific topics will cover social engineering, malware types, social media safety, cyber bullying, and digital wellness. The syllabus also addresses technical measures like HTTPS, OS security, and cryptography as well as emerging technologies like blockchain and the deep/dark web.

Uploaded by

manomahe0287
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Syllabus for “Microsoft CyberShikshaa

2024”
Syllabus with a total duration of 40 - 45 hours

Serial No. Topics

1 Understanding Physical World vs Virtual World


What is Internet?

2 Understanding the Need of security physical world vs virtual


world. Examples as to why virtual security is important

3 What is Information Security and Introduction to Information


Security

4 Understanding the Concept and need of Cyber Security: Past-


Present & Future

5 Understanding the Importance and Definition of Confidentiality,


Integrity and Availability with Examples

6 Understanding the Need of Passwords

7 Strong Vs. Weak Passwords


Reasons for Password Compromise
How can a password get compromised
Mass Theft & Shoulder Surfing

8 Need for 2 Factor Authentication

9 How to Setup 2 Factor Authentication on various applications.


Facebook, Whatsapp & Gmail

10 Understanding the Concept of Crime


11 Crime in Physical World Vs. Virtual World
Concept of Anonymity

12 Cyber Crime and its types

13 Cyber Crime – Legal and Technical Measures

14 Cyber Crime against Individual: Phishing and Cyber stalking and


harassment. Examples of how a phishing page looks like and how
to avoid it?

15 Understanding the Concept of http Vs https sites.


How to recognise cybercrime and avoid them

16 SSL/HTTPS, secure browsing, patches & updates, webcam


protection

17 Hackers and Hacking

18 Types of Hackers

19 Understanding the Concept of Social Engineering


Social Engineering as a tool to commit cybercrime

20 Types of Devices
Unattended Devices and its Consequences

21 What are Vulnerabilities?

22 Known Vs Unknown Vulnerabilities

23 Understanding the concept of Risk and Threat

24 Understanding Malware and its Type


Virus, Worms & Trojans
25 What is Social Media
The Law Related to Social Media
What to Post and What Not to post on Social Media
Social Media Etiquettes

26 Safe usage of social media


Social Media Analysis & Mapping

27 How to safely use Mobile Phones

28 Securing Personal Devices

29 Clickbait and Clickbait Protection

30 What is Cyber Bullying?


How to keep oneself safe from Cyber Bullying?

31 What is Plagiarism?

32 What are netiquettes? Examples of Netiquettes

33 Reporting of Cyber Bullying?

34 Understanding the Concept of Cyber Wellness

35 What is Digital Detox and its need

36 Where to Imply Digital Detox

37 How To Implement: Digital Detox Habits Into Practice

38 Operating system
OS Security

39 Network Security

40 Web App Security

41 Database Security

42 Introduction to Open Source Intelligence

43 What is OSINT?
Who uses OSINT and why?
44 End-Point Security

45 Cryptography and Stenography

46 Blockchain, Cryptocurrency & Bitcoin

47 Surface web, Deep web & Dark web


Crime in the Dark web
New Generation Technologies

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy