PGDCSL Progam Details
PGDCSL Progam Details
University of Delhi
Sr.
No. Content Pages
I Preamble 2
1
Post Graduate Diploma in Cyber Security and Law
University of Delhi
PREAMBLE
SESSION DURATION
SEMESTER 1 SEMESTER 2
Exams 1 1
COURSE CONTENT
Semester I Semester II
2
Post Graduate Diploma in Cyber Security and Law
University of Delhi
EXAM: Diploma Certificate will be issued to participants only after clearing final examination
of both the semesters conducted the end of the final semester. The span period of the course will
be as per the University Policy.
Semester I
Papers Hrs. For Total Marks
lectures and marks
labs
Paper Title Internal Practical Writte
No. assessment n
Exam
3
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester II
Papers Hrs. For Total Marks
lectures and marks
labs
Paper Title Internal Practical Written
No. assessment Exam
SCHEME OF EXAMINATIONS
4
Post Graduate Diploma in Cyber Security and Law
University of Delhi
1. The minimum marks required to pass any paper in a semester shall be 50% in each paper
and 50% in aggregate of a semester.
2. Semester to Semester Promotion: Students shall be required to fulfil the Part to
Partpromotion criteria. Students shall be allowed to be promoted from semester I to
semester II, provided s/he has passed at least 60 per cent of the papers in the course of the
current semester including project.
DIVISION CRITERIA
Successful candidates will be classified on the basis of the combined results of Semester -I and
Semester -II examinations as follows:
● Candidates securing 60% and above: I Division
● Candidates securing 50% or more but less than 60%: II Division
ATTENDANCE REQUIREMENT
Attendance in lectures, tutorials, seminars etc. arranged by the Centre for Cyber Security and
Laws from time to time, is mandatory according to the Internal Assessment requirement as per
University rules. The marks for attendance shall be awarded on the basis of existing norms as per
the Internal Assessment Scheme of University of Delhi.
5
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester - 1
Paper 101: Fundamentals of Computer Security
Objective: This course will be responsible to lay the foundation for creating comprehensive
understanding in the field of cyber security. With a view that incumbents in this diploma course
are from varied disciplines, this paper will set the level field for all the students to be able to
come at par and move together as they must go deeper into hard-core cyber security topics
during the course duration.
Python Basics, Variables and Types, Lists, Basic Operators, String Formatting, Basic String
Operations, Conditions, Loops, Functions, Classes and Objects, Dictionaries, Modules and
Packages.
Need for Cyber Regulations; Scope and Significance of Cyber laws : Information Technology
Act 2000; Network and Network Security, Access and Unauthorised Access, Data Security, E
Contracts and E Forms. Penal Provisions for Phishing, Spam, Virus, Worms, Malware, Hacking,
Trespass and Stalking; Human rights in cyberspace, International Co-operation in investigating
cybercrimes.
Encoding: Charset, ASCII, UNICODE, URL Encoding, Base64, Illustration: ISBN/ QR Code/
Barcode, Binary hamming codes and Binary Reedmuller codes.
6
Post Graduate Diploma in Cyber Security and Law
University of Delhi
HTML Basics, XAMPP Server Setup, Hosting Websites Linux, Apache, Virtualisation, Server
Configurations, Web Application Firewalls..
Suggested Readings:
1. Langtangen, H.P. (2012). Python Scripting for Computational Science (4th Ed.). Springer
2. Behrouz A. Forouzan (2004). Data communication and Networking. Tata McGraw-Hill.
3. Kurose, James F. & Ross, Keith W. (2003). Computer Networking: A Top-Down Approach
Featuring the Internet (3rd Ed.). Pearson Education.
4. Shklar, L. & Rosen, R. (2009). Web Application Architecture: Principles, Protocols and
Practices (2nd Ed.). John Wiley & Sons.
5. Craig, B. (2012). Cyber Law: The Law of the Internet and Information Technology. Pearson.
6. Sharma J. P. & Kanojia S. (2016). Cyber Laws. New Delhi: Ane Books Pvt Ltd.
7. Paintal, D. Law of Information Technology. New Delhi: Taxmann Publications Pvt. Ltd.
8. Forbes, A. (2015). The Joy of PHP: A Beginner's Guide to Programming Interactive Web
Applications with PHP and mySQL (4th Ed.). Plum Island Publishing LLC.
9. Shema, M. (2012). Hacking Web Apps: Detecting and Preventing Web Application Security
Problems.
10. Peterson. W.W, (1972), Error Correcting Codes, MIT Press
11. Hill. R, (1980), A First Course in Coding Theory, Oxford University Press.
12. Macwilliams F J and Sloane N J A, (2013), Theory of Error Correcting Codes, North
Holland Elsevier Science Ltd
7
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester - 1
Paper 102: Network Basics and Network Security
Objective: This course aims at teaching students about the fundamentals and distinctions of
network building along with setup of present day networks in complex environments. The
networks today are vulnerable to various attacks and the course aims at acquainting students with
the techniques used by hackers for network attacks and also the techniques adopted in order to
guard the entire infrastructure against varied attacks.
Types of networks, IP Address, NAT , IP Subnets, DHCP Server, Ports, DNS, Proxy Servers,
Virtual Private Networks, DNS Server, OSI and TCP IP Model, Routers , Switches, Endpoint
solutions, Access Directory, TOR Network. Networking Devices (Layer1,2,3) - Different types
of network layer attacks–Firewall (ACL, Packet Filtering, DMZ, Alerts and Audit Trails) –
IDS,IPS and its types (Signature based, Anomaly based, Policy based, Honeypot based).
VPN and its types –Tunneling Protocols – Tunnel and Transport Mode –Authentication Header-
Encapsulation Security Payload (ESP)- IPSEC Protocol Suite – IKE PHASE 1, II – Generic
Routing Encapsulation(GRE). Implementation of VPNs.
Network Sniffing, Wireshark, packet analysis, display and capture filters, ettercap, DNS
Poisoning, ARP Poisoning, Denial of services, Vulnerability scanning, Nessus, Network
Policies, Open VAS, Sparta,Network Scanning Report Generation, System hardening, secure
system configurations, SSL Striping, Setup network IDS/IPS, Router attacks, VPN Pentesting,
VOIP Pentesting,
Network Exploitation OS Detection in network, nmap, open ports, filtered ports, service
detection, metasploit framework, interface of metasploit framework, network vulnerability
assessment, Evade anti viruses and firewalls, metasploit scripting, exploits, vulnerabilities,
8
Post Graduate Diploma in Cyber Security and Law
University of Delhi
payloads, custom payloads, nmap configuration, Social Engineering toolkit, Xero sploit
Framework, exploits delivery. End Point Security.
Protocols, MAC Filtering, Packet Encryption, Packet Sniffing, Types of authentication, ARP
Replay attack, Fake Authentication Attack, De authentication, Attacks on WEP , WPA and
WPA-2 Encryption, fake hotspots, evil twin attack, fluxion framework
Suggested Readings:
1. Kaufman, C., Perlman, R., & Speciner, M. (2002). Network Security, Private communication
in public world (2nd Ed.). PHI
4. Stallings, W. (2006). Cryptography and Network Security: Principles and Practice (5th Ed.).
Prentice Hall
Latest research papers from refereed journals discussed by the faculty may also be referred.
9
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester - 1
Paper 103: Fundamentals of Web Designing and Web Application Security
Objective: Moving from networks the most important component any technology stack is the
software which is positioned at the top of infrastructure. We will start with the necessities of how
software applications are built, where students will understand and build their applications to
have the real world feel on how the internet stack is working, along with showing them real
loopholes while coding himself so that they understand the real world attacks which are possible
on applications, and simulate them so that they can themselves come to conclusions and
understand the best practices involved in application security.
PHP Basics: Variables, data types, strings, constants, operators, if else, else if statements, switch,
while loops, for loops, functions, arrays, php forms, form handling, validation, form input page
with database attachment, XAMPP Server Setup.
HTTP Request, Response, Header Fields and HTTPS, Understanding Same Origin, Cookies,
Sessions, Web Application Proxies, Information Gathering: whois, nsLookup, netcraft, web
server fingerprinting, subdomain enumeration, fingerprinting frameworks, hidden resource
enumeration, security misconfigurations, google hacking database, Shodan HQ.
Unit III: Web Application Attacks Part I: SQL Injections & Cross Site Scripting
SQL Statements, Finding SQL Injections, Exploiting SQL Injections, Bypass Authentication,
Xpath Injection, Error Based Injection, Double Query Injection, Time Based injections, Union
Based Injections, SQL Map, Mitigation plans, SQLi to Server Rooting, Advance MY-SQL and
MS-SQL Exploitation. Cross Site Scripting: Anatomy of an XSS Exploitation, Reflected XSS,
Persistent XSS, DOM based XSS, Browsers and XSS, Cookie Stealing, Defacements, Advanced
Phishing attacks, BeEF Framework, Mitigation.
10
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Single factor and two factor authentication, dictionary and brute force attacks, storing hashes,
blocking malicious request, user enumeration, random password guessing, remember me
functionality, no limit attempts, password reset feature, logout flaws, CAPTCHA, insecure direct
object reference and security, missing function level access control, unvalidated redirects and
forwards, Session ID, LFI and RFI ,Session Attacks via packet sniffing or accessing via web
server and Fixation, CSRF (Cross Site Request Forgery), Pentesting Flash -based applications,
HTML 5, Cross Origin Resource Sharing Policy, Cross Windows Messaging, Web Storage, Web
Sockets, Sandbox, Path Traversal, Arbitrary file uploading, Clickjacking, HTTP Response
Splitting, Business Logic Flaws, denial of services attacks.
Practical: This paper will have 30 lectures for the practical work.
Suggested Readings:
1. Shema, M. & Adam. (2010). Seven deadliest web application attacks. Amsterdam: Syngress
Media.
2. Stuttard, D. & Pinto, M. (2011). The web application hacker’s handbook: Discovering and
exploiting security flaws (2nd ed). Indianapolis, IN: Wiley, John & Sons.
3. Heiderich, M., Nava E.A.V., Heyes, G., & Lindsay, D. (2011). Web application obfuscation.
Amsterdam: Syngress Media,U.S.
4. Sullivan, Bryan (2012). Web Application Security, A Beginner’s Guide. McGraw- Hill
Education.
Latest research papers from refereed journals discussed by the faculty may also be referred.
11
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester - 1
Paper 104: Cryptography
Objective: After infrastructure and software, the communication in between multiple devices
using applications and securing them become most important, cryptography is the mechanism
using which we hide the information in public eye site from anybody and is something which is
used very popularly almost anything across the internet. So we start with fundamentals of what is
cryptography and how cryptography algorithms work and then come to real world scenarios on
how currently our data processed on the internet is secured from the eyes of an intruder. Further,
the paper enables the students to use cryptography in the most extensive and elaborate manner.
12
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Suggested Readings:
2. Stallings, W. (2010). Cryptography and network security: Principles and practice (5th
ed.) Boston: Prentice Hall.
3. Menezes, A.J., Oorschot, P. Van & Vanstone, S.A. (1997). The Handbook of Applied
Cryptography. CRC Press.
Latest research papers from refereed journals discussed by the faculty may also be
referred.
13
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester - 1
Paper 105: Cloud Fundamentals and Cloud Security
Objective: The purpose of the course is to make students understand and comprehend the
revolutionizing concept of CLOUD in the cyber world with a view to enable them with
achieving cloud security. It also aims at developing expertise amongst students with the cloud
architecture as well as the security concerns for organizations planning a move towards Cloud or
planning to enhance their cloud security.
14
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Suggested Readings:
2. Rountree, D. & Castrillo, I. (2013). The Basics Of Cloud Computing: Understanding The
Fundamentals Of Cloud Computing In Theory And Practice. Syngress, Elsevier
4. Vacca, J. (2016). Cloud Computing Security: Foundations and Challenges. CRC Press
Latest research papers from refereed journals discussed by the faculty may also be referred.
15
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester - 1
Paper 106: Project - 1
● The students would develop their project individually and get the topic approved by the
head/ director of the centre. For the purpose of approval, they have to submit their project
titles and proposals with the name of internal or external guides to the head/ director of
the centre within forty five days of the commencement of the semester. In case, if the
student proposal is rejected, the revised proposal, is required to submit and get it
sanctioned within next seven days. Failing to do this, He/she will not be qualified for this
subject.
● The students have to report to the guide for at least three times during the project lifespan
with the progress report duly signed by the internal guide. Moreover they have to submit
the progress reports with the final project report at the time of external examination.
● The external examiners appointed by the head/ director of the Institute shall award the
marks out of 20 on the basis of the Presentation, Demonstration, Viva-Voce, and out of
40 on the basis of Project Report. The internal guide shall award out of 40 Marks.
16
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester 2
Paper 201: Mobile Eco- System Security
Objective: At time when companies are looking at not only a mobile first approach but a mobile
only approach, the cell phone revolution has hit both the enterprise and the consumer market in a
massive way. Its entire eco system needs to be very carefully understood , and the various attacks
which can be possible at each stage needs to be carefully, practically performed in order to
understanding how to protect the entire mobility ecosystem, which is going to be one of the most
important pillars of transforming an organisation into a digital organisation.
Suggested Readings:
1. Fried, S. (2010). Mobile device security: A comprehensive guide to securing your
information in a moving world. Boca Raton, FL: Auerbach Publications.
2. Stuttard, D. & Pinto, M. (2011). The web application hacker’s handbook: Discovering
and exploiting security flaws (2nd ed.). Indianapolis, IN: Wiley, John & Sons.
3. Dwivedi, H., Clark, C., & Thiel, D. (2010). Mobile application security. New York:
McGraw-Hill Companies.
17
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester 2
Paper 202: Internet of Things Security (IoT)
Objective: The human race is going to go through a major transformation in the next ten years
thanks to the internet of thing , when such a transformation happens, where internet and
technology are going to touch possibly every aspect of our life , the security of the same would
be of highest importance , here we will dwell with most popular IoT devices available in the
market at present and their security concerns along with potential hacks that can be performed on
such devices and to ensure its security according to best global practices.
Unit I: Introduction
Requirement and Basic Properties in Internet of Things, Primary challenges in security
maintenance, Confidentiality, Integrity, Availability, Non-Repudiation.
Suggested Readings:
1. Russell, B. (2016). Practical Internet of Things Security. Packt Publishing Limited
2. FeiHu (2016). Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and
Implementations. CRC Press
3. Hersent, O., Boswarthick, D., & Elloumi, O. (2015). The Internet of Things: Key
Applications and Protocols. Wiley
4. Pfister, C. (2011). Getting Started with the Internet of Things. Shroff Publisher.
18
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester 2
Paper 203: Supervisory Control and Data Acquisition (SCADA) System and
Information Hiding Techniques
Objective: What Internet of things would be to consumers, SCADA and Industrial control
systems would be to enterprises, the heavy machinery that we have been thinking of its
intelligent management is going to be completely taken over by the technology. Although it
looks like a great boon however if take over, we have seen in the past some of the national
critical infrastructures of some very developed countries being compromised and the damages
happening which are irreversible hence it becomes most important to understand the cyber risks
that such technologies posses and to give the education of the best practices followed for
securing such technologies.
Unit I: Introduction
Network Segmentation and Segregation , Boundary Protection, Firewalls , Logically Separated
Control Network , Network Segregation, Recommended Defence-in-Depth Architecture, General
Firewall Policies for ICS , Recommended Firewall Rules for Specific Services , Network
Address Translation (NAT), Specific ICS Firewall Issues , Unidirectional Gateways , Single
Points of Failure , Redundancy and Fault Tolerance , Preventing Man-in-the-Middle Attacks ,
Authentication and Authorization , Monitoring, Logging, and Auditing, Monitoring, Logging,
and Auditing , Response, and System Recovery
19
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Suggested Readings
1. Macaulay, T. & Singer, B. (2016). Cybersecurity for industrial control systems: SCADA,
DCS, PLC, HMI, and SIS. Boca Raton, FL: CRC Press.
2. Langner, R. (2011). Robust control system networks: How to achieve reliable control
after Stuxnet. New York: Momentum Press.
3. Knapp, E.D. & Langill, J.T. (2011). Industrial network security: Securing critical
infrastructure networks for smart grid, SCADA , and other industrial control systems.
Waltham, MA: Syngress Media, U.S.
5. Cox, I., Miller, M., Bloom, J., Fridrich, J. & Kalker, T. (2007). Digital Watermarking and
Steganography (2nd Ed.). Elsevier.
Latest research papers from refereed journals discussed by the faculty may also be referred.
20
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester 2
Paper 204: Cyber Law and Forensic Evidence
Objective: The paper aims to create the basic clarity and understanding of cybercrimes and
cyber security laws to the professionals learning the ethical hacking programme. The paper
would address and emphasise on the activities leading to infringement of individual or
organisational privacy. Further, the paper intends to create highly sensitised professionals who
can be responsible for handling the cyber security issues pertaining to varied domains and
dealing in forensics diligently.
21
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Introduction to Encase Forensic Edition, Forensic Toolkit etc, Use computer forensics software
tools to cross validate findings in computer evidence-related cases.
Suggested readings
1. Craig, B. Cyber Law: The Law of the Internet and Information Technology. Pearson
Education
2. Paintal, D. Law of Information Technology. New Delhi: Taxmann Publications Pvt. Ltd.
3. Lindsay, D. (2007). International domain name law: ICANN and the UDRP. Oxford:
Hart Publishing.
4. Sharma J. P, & Kanojia S. (2016). Cyber Laws. New Delhi: Ane Books Pvt. Ltd.
7. Stephenson, P.R. & Gilbert, K. Investigating computer- related crime a handbook for
corporate investigators. Boca Raton, FL: Taylor & Francis.
8. Prosise, C. & Mandia, K. (2003). Incident response & computer forensics (2nd ed.). New
York, NY: McGraw-Hill Companies.
Latest Editions of the Suggested Readings along with discussion material by the Faculty.
22
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Semester 2
Paper 205: Information Security Compliance Management
Unit IV: Concluding and ensuring the follow-up of an ISO/IEC 27001 audit
Audit documentation, Quality review, Conducting a closing meeting and conclusion of an
ISO/IEC 27001 audit, Evaluation of corrective action plans, ISO/IEC 27001 Surveillance audit,
internal audit management program
23
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Suggested Readings:
Latest research papers from refereed journals discussed by the faculty may also be referred.
24
Post Graduate Diploma in Cyber Security and Law
University of Delhi
● The students would develop their project individually and get the topic approved by the
head/ director of the centre. For the purpose of approval, they have to submit their project
titles and proposals with the name of internal or external guides to the head/ director of
the centre within twenty one days of the commencement of the semester. In case, if the
student proposal is rejected, the revised proposal, is required to submit and get it
sanctioned within next seven days. Failing to do this, He/she will not be qualified for this
subject.
● The students have to report to the guide for at least five times during the project lifespan
with the progress report duly signed by the internal guide. Moreover they have to submit
the progress reports with the final project report at the time of external examination.
● The external examiners appointed by the head/ director of the Institute shall award the
marks out of 20 on the basis of the Presentation, Demonstration, Viva-Voce, and out of
40 on the basis of Project Report. The internal guide shall award out of 40 Marks.
25
Post Graduate Diploma in Cyber Security and Law
University of Delhi
Admission criteria
Qualifying examination for the purpose of Admission to the Post Graduate Diploma in Cyber
Security and Law shall be graduates or above in Science (Physics & Chemistry), Information
Technology, Mathematics, Engineering in Technology (Computer science/
Electronics/Electronics and Communication, Information Technology), BCA, MCA, M.Tech or
any other degree equivalent thereto. The admissions shall be based on the merit drawn from the
marks obtained in graduation and personal interview. The admission process shall be following:
STAGE I: The merit list, for admission shall be determined on the basis of marks obtained
(CGPA equivalent thereto) by the candidate in graduation or in the degree applicable as
qualifying examination.
STAGE II: The candidates shall be called for Personal Interview on the basis of merit drawn as
prescribed in stage I.
Stage III: A combined merit on the basis of 85% from Stage I and 15 % from Stage II shall be
drawn. Admissions shall be based in the order of combined merit.
Note: Candidates appearing in the final year examination of Bachelor’s degree are eligible to
apply. If selected, candidates will be eligible for admission only when they submit the result
meeting the minimum eligibility criteria at the time of final admission, as per University Rules.
26