Cyber Security
Cyber Security
Description of Minor:
Cyber Security is the study of protecting, recovering and defending computer systems,
devices, and networks against any type of cyber-attacks from both intruders as well as
extruders. All businesses, whether large or small, rely on data on computer systems.
Many devices are used by an individual for network access on a daily basis. Hence,
protecting data and networks from hackers, and protecting businesses against malware,
phishing, social engineering and ransomware types of attacks is the need of the day.
Lack of knowledge related to cyber security exposes an individual to the whole world
of attacks. Hence, provisioning of defense is the best way of ensuring data and
personal security on the virtual internet platform.
*Disciplinary Minor will be offered for the students of Computer Science and
Engineering Department, IT-NU.
** Students who have opted for Minor in Cyber Security will not be permitted to
select department electives courses such as Quantum Computing and Network
Security
w.e.f. for the first-year students admitted in 2022-23 and D to D students admitted in
2023-24 onwards
Details of Courses: Available on next pages
NIRMA UNIVERSITY
Institute: Institute of Technology
Name of B.Tech.(CSE)
Programme:
Course Code: XXXX
Course Title: Information and Network Security
Course Type: Minor Core Course – I (Cyber Security) - Disciplinary
Year of 2024-25
Introduction:
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
Overview: This course focuses on the principles and practices of developing secure
applications. Students will learn about secure coding standards, security testing tools,
and practical skills for building robust, secure software applications.
Suggested 1. Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw and
Readings/ Nancy Mead, Software Security Engineering: A Guide for Project
References: Managers, Addison-Wesley Professional
2. Dafydd Stuttard and Marcus Pinto, The Web Application Hacker's
Handbook, Wiley India
3. Gary McGraw, Software Security: Building Security, Addison-
Wesley.
4. Adam Shostack, Threat Modelling: Designing for Security, John
Wiley and Sons Inc.
5. Mano Paul, 7 Qualities of Highly secure Software, Taylor and
Francis, CRC Press.
6. John Musa D, Software Reliability Engineering, Tata McGraw-
Hill
NIRMA UNIVERSITY
Institute: Institute of Technology
Name of B.Tech.(CSE)
Programme:
Course Code: XXXX
Course Title: System and Website Audit
Course Type: Minor Elective -I (Cyber Security) - Disciplinary
Year of 2024-25
Introduction:
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
Overview: The System and Website Audit course is designed to equip participants with
the knowledge and skills necessary to conduct comprehensive audits of information
systems and websites. Auditing is a critical component of ensuring data security,
compliance, and the overall health of IT infrastructure. This course covers various
aspects of auditing, including methodologies, tools, and best practices, enabling
participants to assess the security and performance of systems and websites effectively.
Syllabus: Total Teaching
hours: 45
Unit Syllabus Teaching
hours
Unit-I Governance and Management of IT: IT Governance, Information 05
Security Policy Document, IS Management Practices, Organizational
Quality Management.
Unit-II Information Systems auditing: Understanding the organization’s 05
business, The IS audit life-cycle, The IS audit role, The IS auditor
responsibility, authority and accountability, Code of professional
ethics, laws, and regulations
Unit-III Security and Risk Management: Introduction to Security and Risk 15
Management, Understand and Apply Security Concepts, Evaluate and
Apply Security Governance Principles, Data Protection Principles,
Risk
Analysis, Risk Analysis and Assessment, Risk Handling and Security
Control Assessment, Risk Monitoring, Threat Modelling, Third-Party
Risk Management Life Cycle
Unit-IV Introduction, Design and Validate Assessment, Test and Audit 15
Strategies, SOC Reports and Security Assessments, Network
Vulnerability Scan and Web Vulnerability Scan, Penetration Testing
Process and Testing Types, Testing Methods.
Unit-V Protection of Information Assets: IS Network Infrastructure, 05
Protecting Data, Key Elements, Roles, and Responsibilities
NIRMA UNIVERSITY
Institute: Institute of Technology
Name of Programme: B.Tech.(CSE)
Course Code: XXXX
Course Title: Quantum Computing
Course Type: Minor Elective -I (Cyber Security) - Disciplinary
Year of Introduction: 2024-25
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
Overview: This course explores the features of quantum computing, like superposition
of states, nonlocality, probabilistic laws, uncertainty, and the implications of the
quantum world on computer science. The course is a technical journey about how the
quantum realm can disrupt the world of Computer Science in terms of Architecture,
Algorithms, Programming Language, Theoretical Computer Science, Cryptography,
Information Theory, and Hardware.
Syllabus: Total Teaching
hours: 45
Unit Syllabus Teaching
hours
Unit-I Complex Numbers: Basics, Algebra of Complex Numbers, Geometry 06
of Complex Numbers, Properties, Examples, Basis, Dimension, Inner
Products and Hilbert Spaces, Eigenvalues and Eigenvectors, Hermitian
and Unitary Matrices, Tensor Product of Vector Spaces
Unit-II Leap from Classical to Quantum: Classical Deterministic Systems, 03
Probabilistic Systems, Quantum Systems, Assembling Systems
Unit-III Basic Quantum Theory: Quantum States, Observables, Measuring, 06
Dynamics, Assembling Quantum Systems, Bits and Qubits, Classical
Gates, Reversible Gates, Quantum Gates
Unit-IV Algorithms: Deutsch’s Algorithm, Deutsch-Jozsa Algorithm, Simon’s 06
Periodicity Algorithm, Grover’s Search Algorithm, Shor’s Factoring
Algorithm
Unit-V Programming Languages: Quantum Assembly Programming, 06
Toward Higher-Level Quantum Programming, Quantum Computation
Before Quantum Computers
Unit-VI Theoretical Computer Science: Deterministic and Nondeterministic 04
Computations, Probabilistic Computations, Quantum Computations
Unit- Cryptography: Quantum Key Exchange Algorithms – BB84, B92 04
VII and EPR Protocols, Quantum Teleportation
Unit- Information Theory: Classical Information and Shannon Entropy, 05
VIII Quantum Information and von Neumann Entropy, Classical and
Quantum Data Compression, Error Handling Codes
Unit-IX Hardware: Goals and Challenges, Quantum Computers - Ion Traps, 05
Linear Optics, NMR and Superconductors
Suggested 1. Noson S Yanofsky and Mirco A. Mannucci, Quantum Computing
Readings/ for Computer Scientists, Cambridge University Press
References: 2. Vishal Sahni, Quantum Computing, Tata McGraw-Hill Edition
3. Chris Bernhardt, Quantum Computing for Everyone, The MIT
Press
NIRMA UNIVERSITY
Institute: Institute of Technology
Name of Programme: B.Tech.(CSE)
Course Code: XXXX
Course Title: Blockchain and cryptocurrency
Course Type: Minor Elective -I (Cyber Security) - Disciplinary
Year of Introduction: 2024-25
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
Overview: This course aims to understand the features and importance of blockchain
technology to enhance the security of various industrial applications. Blockchain is a
versatile technology beyond cryptocurrencies, offering a distributed ledger with solid
security features. It has applications in various fields like time stamping, event
logging, e-governance, and more. Researchers and companies are exploring uses like
identity management, health records, IoT, etc.
Syllabus: Total Teaching
hours: 45
Unit Syllabus Teaching
hours
Unit-I Introduction to Blockchain: Need, Blockchain 1.0 to 5.0, types of 08
blockchain, Generic elements of a blockchain, digital money to
distributed ledgers, design primitives, secure cryptographic protocols
on blockchain, security, consensus, permissions, and privacy.
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
Overview: This course aims to protect networks and systems from diverse cyber threats
effectively; an IDPS must achieve these goals. It's essential to continually update and
adapt IDPS strategies to counter emerging threats and vulnerabilities in the ever-
changing cybersecurity landscape. This course covers the basic concepts of intrusion
detection and prevention systems, including different types of IDPS, their architecture,
deployment, and valuable applications. Using IDPS, students will learn how to assess
security situations and take appropriate action.
Syllabus: Total Teaching
hours: 45
Unit Syllabus Teaching
hours
Unit-I Introduction to IDS and IPS: Understanding Intrusion Detection – 05
Intrusion detection and prevention basics – IDS and IPS analysis
schemes, Attacks, Detection approaches –Misuse detection – anomaly
detection – specification-based detection – hybrid detection, Types of
IPS
L T Practical Component C
LPW PW W S
3 0 2 - - - 4
Overview: This course aims to enhance design processes and security in embedded
systems. Such systems play a significant role in controlling large infrastructure-based
products, including single-purpose devices. However, their use can also expose
vulnerabilities that can be exploited easily to compromise confidential information,
temper device functionalities, and impose other risks. This course will provide a basic
understanding of specific vulnerabilities of attackers commonly target embedded
systems. Different strategies and methods to integrate security measures into embedded
systems, starting from product design, building, and maintenance, are also covered in
this course. Through a blend of theory and hands-on practices, students will be able to
learn about current security threats to embedded systems and solutions to incorporate
the required measures to prevent them