cyber security management
cyber security management
PLO
PLO 1 PLO 2 PLO 3 PLO 4 PLO 5 PLO 6 PLO 7 PLO 8 PLO 9
CLO
CLO 1 √
CLO 2 √ √
CLO 3 √ √
CLO 4 √ √
16 Content outline of the course and the SLT per topic::
Face to Face Independent Learning
Content L T P O L T P O TLT
I Introduction:
• Codes and Ciphers
• Some Classifiable systems
• Statistical theory of cipher systems
3 1.5 - - 3 1.5 - - 9
• Complexity theory of crypto
systems
• Stream ciphers
• Block ciphers
II Stream Ciphers:
• Rotor based system
• shift register based systems
• Design considerations for stream 3 1.5 - - 3 1.5 - - 9
ciphers
• Cryptanalysis of stream ciphers
• Combined encryption
III Block Ciphers
• DES and variant,
• Modes of use of DES
• Public key systems
• knapsack systems
3 1.5 - - 3 1.5 - - 9
• RSK
• Diffle Hellman Exchange
• Authentication and Digital
signatures
• Elliptic curve based systems.
IV System Identification and clustering:
3 1.5 - - 3 1.5 - - 9
• Cryptology of speech signals
• Narrow band and wide band
systems Analogue & Digital
• Systems of speech encryption
V Security: Hash function – Authentication:
• Protocols 3 1.5 - - 3 1.5 - - 9
• Digital Signature standards.
VI Electronics Mail Security
• PGP (Pretty Good Privacy) MIME 3 1.5 - - 3 1.5 - - 9
• Data Compression technique.
VII IP Security:
• Architecture
• Authentication Leader 3 1.5 - - 3 1.5 - - 9
• Encapsulating security Payload
• Key Management
VIII Web security:
• Secure Socket Layer & Transport
Layer security,
• Secure electronic transactions.
• Firewalls Design principle
• Established systems.
• Telecommunication Network
Architecture, Management
Information Model 9 4.5 - - 9 4.5 - - 27
• Management servicing and
functions Structure of management
information
• TMN information model
• SNMP v1, SNMP2 & SNMP3,
• RMON1 & 2
• Broadband Network Management
(ATM, HFC, DSL), ASN
IX Intrusion Techniques
• Foot Printing
• Social Engineering.
• Scanning Exploits.
5 3 - - 5 3 - - 16
• System Hacking.
• Web Server Hacking
• Countermeasures
• Patching the vulnerabilities
X Firewalls and UTM
• Cisco PIX / ASA
• Types of Firewalls, Installation of
PIX / ASA
• Bridge Mode
• Basic Configuration
• NAT
5 3 - - 5 3 - - 16
• Authentication
• Logging, Monitoring
• IPSEC VPN
• SSL VPN
• Backup and Restore
• ASQ (IPS) and QoS
• SEISMO
TOTAL 40 21 0 40 21 0 0 122
Face to Face Independent Learning
Lecture 40 40
Tutorial 21 21
Assignment 1 ( 2000 words) - 10
Assignment 2 ( 2000 words) - 10
Quizzes 01 03
Test 01 03
Final Examination 03 09
Total 66 96
162
Credit Hour 4
17 Main references supporting the course:
Richard, A. C. & Robert, K. (2012). Cyber War: The Next Threat to National Security and What to Do About
It. Ecco.
Additional references supporting the course
Jason, A., & Steve, W. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners.
Syngress