Information Security
Information Security
APPIN PATHFINDER
3-year Undergraduate Program COURSE STRUCTURE
FIRST SEMESTER
Computer and Internet Technology C Programming Introduction to Information Security Desktop and Server Security
SECOND SEMESTER
Introduction to Java Programming Data Structures Data Security Web Security
THIRD SEMESTER
C++ Programming Data Communication and Networking Information Security Management Systems Protection from Hacking Attacks
FOURTH SEMESTER
Microsoft .Net Advanced Networking Network Security Cyber Forensics
FIFTH SEMESTER
Vulnerability Assessment and Penetration Testing Cyber Laws and IT Acts Secured Programming Cryptography
THIRD SEMESTER
PAPER I: C++ PROGRAMMING
UNIT I Introduction: Object-Oriented Approach, Relating to other paradigms (functional, data decomposition). Basic terms and ideas: Abstraction, Encapsulation, Inheritance, Polymorphism, Difference between C and C++ - cin, cout, new, delete operators. UNIT II Classes and Objects: Encapsulation, information hiding, abstract data types, Object & classes, attributes, methods, C++ class declaration, State identity and behavior of an object, UNIT III Constructors and destructors, instantiation of objects, Default parameter value, object types, C++ garbage collection, dynamic memory allocation, Metaclass/abstract classes. UNIT IV Inheritance and Polymorphism: Inheritance, multiple inheritance, Class hierarchy, derivation public, private & protected, Aggregation, composition vs classification hierarchies, UNIT V Polymorphism, Categorization of polymorphism techniques, Polymorphism by parameter, Operator overloading, Parametric polymorphism. UNIT VI Generic function template function, function name overloading. STL (Standard Template Library) . UNIT VII Files and Exception Handling: Persistant objects, Streams and files, Namespaces, Exception handling, Generic Classes.
FIFTH SEMESTER
PAPER I: VAPT
UNIT - I Introduction: Important Technical Terms, Information Gathering, Scanning and fingerprinting UNIT - II Vulnerability Assessment: Vulnerabilities, Vulnerability Assessment, Approach to Data Security, Protective Measures, Method UNIT - III Footprinting: Introduction, VA - Right Tools To Protect Your Critical Data, Types of vulnerability Assessment, The Challenges of Vulnerability Assessments, Appin Tool For Vulnerability Assessment, Tools for VA UNIT - IV Penetration Testing: Introduction and methodology, Types of Penetration Tests, Methodology Penetration Testing Approach, Penetration Testing vs. Vulnerability Assessment UNIT - V Identifying The Vulnerability: How Vulnerabilities Are Identified, Sample Penetration Testing Report, Security services, Security Services Management Tools, Firewall
SIXTH SEMESTER
INTERNSHIP/PROJECT WORK