Cyber Security
Cyber Security
in
Cyber Security
2022-23
(Duration : Six Months)
Under
Sambalpur University
Jyoti Vihar, Burla – 768019, Odisha
Page 1 of 18
Scheme of the Course
Sl. Paper
Paper Name Credits T+L
No Code
1 CS101 Network Protocols and Cryptography 4 3+1
2 CS102 Block Chain 4 3+1
3 CS103 Python Programming 4 3+1
4 CS104 Machine Learning for Cyber Security 4 3+1
5 CS105 Artificial Intelligence for Cyber Security 4 3+1
6 CS106 Ethical Hacking and Kali Linux 4 3+1
7 CS107 Project 8
Total Credit 32
Page 2 of 18
Regulation for Certificate Programme in Cyber Security (CPCS)
1. The certificate programme in Cyber Security (CPCS) is a six months full time certificate
programme. After successful completion of the programme certificate will be provided to
the qualified students.
2. Duration:The duration of the programme shall be six months with one semester. There
will be two session in a year i.e. July to December and January to June.
3. Eligibility Criteria: the candidate should have passed the +2 examination of CHSE,
Odisha or its equivalent board / council in any discipline with minimum 40% marks in
aggregate. The selection will be based on the marks obtained in +2 examinations.
4. Number of Papers: During the course the student has to cover six papers each with 04
credits and 01 project with 08 credits. There will be approximately 10 classes of 01 hour
duration for each one credit of a paper.
5. Attendance: A candidate shall be required to attend 75% of class during a Semester.
Condonation may be granted by the Principal only to the extend of 15% in exceptional
cases i.e. Serious Illness &Hospitalization, Accident, Mishap in the family, Deputation by
the college for any specific work. The candidates falling short of required attendance
percentage will not be allowed for form fill up for the university examination. The
candidate will appear the examination in the next batch.
8. Passing Criteria: Each of the paper will carry 100 marks and the project will carry 200
marks. The marking will be based on numerical score. The candidate remaining absent in
either internal examination or university examination in any paper will be considered as
absent in that paper inspite of securing marks in any one of the components.
Page 3 of 18
i. To pass a paper, a candidate should score minimum 50 percent marks in that
paper with at least 40 percent marks each in Internal examination and University
examination.
ii. To pass the project, a candidate should score a minimum of 60 percent marks.
iii. In order to become eligible for awarding certificate the candidate must pass in all
individual papers and the projects.
9. Award of Certificate: A candidate meeting the passing criteria will be eligible for
certificate. The following award may be given to qualifying candidates.
i. 50% - 65% - Pass
ii. 65% - 80% - 1st Class
iii. Above 80% - 1st Class with Distinction.
10. Back Examination: Candidate failed in any papers in an examination can re-appear for
the next examination for the next batch in those papers where he / she have scored less
than 50% marks.
11. Improvement Examination: Candidate passed in all the papers and project and got pass
award may appear for improvement examination in the next examination with the next
batch students. A maximum of 03 papers can be selected for improvement and only one
chance will be provided.
12. Project Evaluation: The project will be assigned by the faculty members of the institute
after 03 months of the class commencement. Project will be evaluated through panel of
examiners whose name will be approved by BOS. There will be 200 marks for the project
where 100 marks to be given by internal faculty and balance 100 marks will be given by
external examiner. Absence in project evaluation shall be treated as fail in that paper.
13. Question paper setting: The question paper should be set in such a manner that the
question paper should cover all the units.
Page 4 of 18
Certificate Programme in Cyber Security
Course Structure
2 Block Chain 4
3 Python Programming 4
7 Project 8
Page 5 of 18
Syllabus
Network Protocols and Cryptography
Module-I Data Centers and the Enterprise Network Architecture and its Components
: Exploring networks and data flows
The data center, core, and user networks
Switching (L2) and routing (L3) topologies
The network perimeter
The data, control, and management planes
SDN and NFV
Cloud connectivity
Types of attacks and where they are implemented
Page 6 of 18
Authentication basics and protocols
Authorization and access protocols
Hash functions and message digests
IPSec and key management protocols
SSL/TLS and proxies
Network security components – RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and
WAFs
Module-IV Cryptography
About cryptography
Caesar cipher and ROT13
base64 encoding
XOR
MD5 and SHA hashes
Windows password hashes
Linux password hashes
Strong encryption with AES
ECB and CBC modes
Padding oracle attack
Strong encryption with RSA
Text Books
Tanenbaum A.S, (2013). Computer Networks, Pearson Publication
Kurose James F. and Ross Keith W.,(2017). Computer Networking – A top down
approach featuring the Internet, Pearson Publications.
Stallings William,(2017), Cryptography and Network Security - Principles and Practice ,
Pearson Publication
Page 7 of 18
Syllabus
Block Chain
Objective- Blockchain is a disruptive technology that promises to disrupt many sectors of the
global economy. This innovative technology aims to revolutionize those industries that rely on
intermediation and trust by shifting the paradigm away from the currently dominant centralized
architectures and toward decentralization.
Total Credit-4
Hours/Week-4
Module-I Cyber Threat Landscape and Security Challenges
What blockchain is
Internet versus blockchain
How blockchain works
The building blocks of blockchain
Ethereum blockchain
Private versus public blockchains
Business adaptation
Hyperledger overview
Blockchain as a service
Architecture and core components
Hyperledger Fabric model
Page 8 of 18
Bitcoin versus Etherum versus Hyperledger
Hyperledger Fabric capabilities
Text Books
Page 9 of 18
Syllabus
Python Programming
Objective- A Gentle Introduction to Python, introduces you to fundamental programming
concepts and constructs of the Python language
Total Credit-4
Hours/Week-4
Module-I Introduction to Python
Introduction to Programming
Coding Style and Jupyter Notebook
Objects
Variables and Assignment Statements
Data Types and Data Type Conversion
Module-II Python Control Flows, Strings and Working with Built-in Compound Data Types
Conditional Statements
Iterations and Loops
Strings
Lists
Tuples
Dictionaries
Functions
Modules
Packages
Module-III Working with Python Scripting
Introduction to Python scripting
Exploring Python data structures
Python functions, classes, and managing exceptions
Python modules and packages
Managing dependencies and virtual environments
Development environments for Python scripting
Page 10 of 18
Module-IV System Programming Packages and Network Scripting and extracting Information
from the Tor Network with Python
Introducing system modules in Python
Working with the filesystem in Python
Managing threads in Python
Multithreading and concurrency in Python
Working with Python's socket.io module
Introducing sockets in Python
Implementing an HTTP server in Python
Implementing a reverse shell with sockets
Resolving IPS domains, addresses, and managing exceptions
Port scanning with sockets
Implementing a simple TCP client and TCP server
Implementing a simple UDP client and UDP server
Suggested Books
Page 11 of 18
Syllabus
Machine Learning for Cyber Security
Objective- This paper walks you through the major phases of the threat life cycle, detailing how
you can implement smart solutions for your existing cybersecurity products and effectively build
intelligent and future-proof solutions.
Total Credit-4
Hours/Week-4
Page 12 of 18
Module-IV Knocking Down CAPTCHAs
Characteristics of CAPTCHAs
Using artificial intelligence to crack CAPTCHAs
Types of CAPTCHA
Solving CAPTCHAs with neural networks
Using Data Science to Catch Email Fraud and Spam and Efficient Network
Anomaly Detection Using k-means
Fraudulent emails and spoofs
Types of email fraud
Spam detection using the Naive Bayes algorithm
Featurization techniques that convert text-based emails into numeric values
Spam detection with logistic regression
Get hold of information
Modify information
Disrupt services
Perform distributed denial of service to and from the server where information is
stored
Exploit using malware and viruses
Privilege escalation and credential compromise
Suggested Books
Clarence Chio and David Freeman (2018). Machine Learning and Security: Protecting
Systems with Data and Algorithms O’REILLY Publications.
McKinney, W Brij B. Gupta and Quan Z. Sheng.(2019). Machine Learning for Computer
and Cyber Security: Principle, Algorithms, and Practices (Cyber Ecosystem and
Security), CRC Press Publication
Page 13 of 18
Syllabus
Artificial Intelligence for Cyber Security
Objective-. This paper presents and demonstrates the popular and successful AI approaches and
models that you can adopt to detect potential attacks and protect your corporate systems. You'll
understand the roles of machine learning (ML) and neural networks (NNs), and deep learning
in cybersecurity, and learn how you can infuse AI capabilities when building smart defensive
mechanisms. As you advance, you'll be able to apply these strategies across a variety of
applications, including spam filters, network intrusion detection, botnet detection, and secure
authentication.
Total Credit-4
Hours/Week-4
Page 14 of 18
Module-III Detecting Cyber security Threats with AI
How to detect spam with Perceptrons
Image spam detection with support vector machines (SVMs)
Phishing detection with logistic regression and decision trees
Spam detection with Naive Bayes
Spam detection adopting NLP
Suggested Books
Dr. Nilakshi Jain (2019). Artificial Intelligence, As per AICTE: Making a System
Intelligent,Wiley Publication
Alessandro Parisi .(2019). Hands-On Artificial Intelligence for Cybersecurity: Implement
smart AI systems for preventing cyber attacks and detecting threats and network
anomalies, Packt Publication
Page 15 of 18
Syllabus
Ethical Hacking and Kali Linux
Objective- Expose vulnerabilities of servers and applications and help developers create robust
systems
Total Credit- 8
Hours/Week- 4
Page 16 of 18
MAC addresses
Wireless modes – managed and monitor
Enabling monitor mode manually
Enabling monitor mode using airmon-ng
WEP theory
Basic web cracking
Fake authentication attack
ARP request replay
WPA introduction
WPA cracking
Handshake theory
Capturing handshakes
Creating wordlists
Wordlist cracking
Securing network from attacks
Suggested Books
Nathan Jones (2021)Hacking with Kali Linux THE ULTIMATE BEGINNERS GUIDE: Learn and
Practice the Basics of Ethical Hacking and Cybersecurity
Ric Messier (2018) Learning Kali Linux: Security Testing, Penetration Testing, and
Ethical Hacking, OREILLY Publication
Page 17 of 18
Course Projects for Cyber Security
Name
Course CS-107
Code
Course 8
Credit
Semester
Aims and Projects will help you to build smart and practical AI-based systems
leveraging deep learning and reinforcement learning. The projects cover a
Objectives
wide range of domain problems related to healthcare, e-commerce, expert
systems, surveillance fashion industry, mobile-based applications, and self-
driving cars using techniques such as convolution neural networks, deep
reinforcement learning, LSTM-based RNNs, restricted Boltzmann machines,
generative adversarial networks, machine translation, and transfer learning.
The theoretical aspects of building the intelligent applications will enable the
reader to extend the projects in interesting ways and get them up to speed in
building impactful AI applications.
Pre-
Requisite
Platform : windows, Linux
Technology: DotNet mvc Framework, Python MVT Framework
Database: Oracle, Access, MySQL, SQLServer
API
Front end : Python, Java, HTML, DotNet
Back end: Oracle, Access, MySQL, SQLServer
Practical
Page 18 of 18