0% found this document useful (0 votes)
192 views14 pages

Em01 - Cyber Security

The document describes an engineering minor in cyber security offered by the School of Computer Science and Engineering. The minor consists of 4 courses focused on cyber security essentials, information system security, securing computing systems, and penetration testing. It provides brief descriptions of each course, including topics covered and learning outcomes. Career opportunities in cyber security are also listed, along with special requirements and the selection criteria for the minor.

Uploaded by

Awaneesh Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views14 pages

Em01 - Cyber Security

The document describes an engineering minor in cyber security offered by the School of Computer Science and Engineering. The minor consists of 4 courses focused on cyber security essentials, information system security, securing computing systems, and penetration testing. It provides brief descriptions of each course, including topics covered and learning outcomes. Career opportunities in cyber security are also listed, along with special requirements and the selection criteria for the minor.

Uploaded by

Awaneesh Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

School of Computer Science

and Engineering
Engineering Minor
• A set of four courses in an engineering stream to develop a
competency within or outside the discipline area (e.g. a computer
science engineering student choosing Cyber Security or Machine
Learning or a mechanical engineering student taking courses from
computer science engineering or as his/her engineering minor area).

• These Engineering Minors are being offered so that each student


would have at least one major skills by the end of 7th term.
Engineering Minor
• Students are expected to provide his/her choice of Engineering Minor
area only once and the set of courses of that particular area would get
registered in pre-defined terms (5th, 6th and 7th).
Engineering Minors in School of Computer Science
and Engineering:
1. Cyber Security
2. Data Science
3. Machine Learning
4. MEAN Stack Development (Not for IT students)
5. Software Methodologies and Testing
Cyber Security
Brief Description
Cyber security transform into a frightening new reality, one where
corporate and government organizations seem helpless to stop cyber
incursions that leads to cyber risk. To mitigate the cyber risk we need
knowledge of cryptographic techniques, traffic monitoring and ethical
hacking knowledge for better understanding of security issues to
protect our network.
Total number of seats: 700

Selection Criteria: Based on preference


and CGPA
Career Opportunities
• Information Security Analyst
• Penetration Tester
• Cyber Security Consultant
• Malware Analyst
• Cyber Threat Management
• Cyber Intelligent Analyst
• can also work as freelancer to provide the security services.
Courses to be studied in Cyber Security
Course
Course Title L T P Credit
Code
INT242 CYBER SECURITY ESSENTIALS 0 0 4 3

INT243 INFORMATION SYSTEM SECURITY 2 0 2 3

INT244 SECURING COMPUTING SYSTEMS 2 0 2 3

INT245 PENETRATION TESTING 2 0 2 3


Description of the Courses
1) INT242 : CYBER SECURITY ESSENTIALS

It covers the concepts of cyber security with their importance and identify various
vulnerabilities and security flaws in the operating systems and networks. It also focuses on
secure social networking sites and email communications along with the prevention methods.
Course Outcome:
• Discover the basic concepts of cyber security and their importance in the cyber world.
• Identify and analyse various vulnerabilities and security flaws in the operating systems,
web servers, network equipments and to be able to patch them.
• Observe the measures to protect a system from possible security breaches.
• Observe application of scripting language in cyber security.
2) INT243 : INFORMATION SYSTEM SECURITY
It introduce the concepts of computer security incident, detection, live data collection and its forensics
duplication. It also emphasis on the data collection techniques and investigate windows systems and
routers for the audit.
Course Outcome:
• Describe the basics of incident response handling process.
• Analyze the practices and procedures involved in incident response handling process.
• Observe different methods of obtaining information and data for forensic investigation.
• Demonstrate various procedures for acquiring forensic evidences and document their details, in
order to present them as legal evidence.
Description of the Courses cont….
3) INT244: SECURING COMPUTING SYSTEMS

It covers the basic concepts of penetration testing along with the analysis of various vulnerabilities
and security flaws exist in the operating systems, web servers, network equipments through the
techniques used by hackers.
Course Outcome:
• Identify the basic concept, fundamentals and practice of penetration testing.
• Analyze various vulnerabilities and security flaws in the operating systems, web servers,
network equipment's and to be able to patch them.
• Distinguish and compare legal and illegal techniques used by hackers, specific types of attacks
and their counter measures.
4) INT245: PENETRATION TESTING
It covers the tools and technologies used by ethical hackers in order to identify weaknesses in
information system and recommend mitigation measures to increase the resistance of the
information technology (IT) infrastructure to unauthorized access.
Course Outcome:
• Recite how to analyze the outcome from the tools and technologies used by ethical hackers.
• Examine intensive assessments required to effectively identify and mitigate risks to the
information security of the infrastructure.
• Summarize weaknesses in information system and recommend mitigation measures to increase
the resistance of the information technology (IT) infrastructure to unauthorized access.
• Analyze the outcomes of their Vulnerability Assessments in the form of Penetration testing
report.
Industrial applications:

• Intelligence agencies
• Defense
• Automation systems
• Retail
• Banking
• Internet of Things
• Automotive sector
• E-commerce
Special requirements:

• Students must bring laptop in class.


• Basic knowledge of Linux and networking is required.
• Continuous 02 hours slots are required.
Selection Criteria:

Preferences would be taken from students. If the number of


students who give preference of this Engineering Minor are more
than the number of seats, then CGPA would be considered for
selection criteria.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy