0% found this document useful (0 votes)
17 views

cyber security management

Uploaded by

S. Pathirathna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

cyber security management

Uploaded by

S. Pathirathna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

No Information on Course

1 Name of the Course: Cyber Security management


2 Course Code: CBS -381
3 Name(s) of Academic Staff: Mr.Vivekanandam
4 Rationale for the inclusion of the course in the programme:
The Cyber security Fundamentals Online Course will provide learners with principles of data and
technology that frame and define cyber security.
5 Semester and Year Offered: 5 Semester 2 year
6 Student Learning Time Face to Face Independent Learning Total Guided and
(SLT) Independent Learning
L = Lecture L T P O L T P O
T = Tutorial 40 21 - 5 40 21 - 35 162
P = Practical
O = Others
7 Credit Value:4
8 Course Learning Outcomes:
At the end of this course, the student should be able to:
CLO 1 Apply cyber security architecture principles. (C3) (PLO1)
CLO 2 Describe risk management processes and practices in the Group assignment.(C2,A1 and P1)
(PLO1, PLO 5)
CLO 3 Identify security tools and hardening techniques(C4,A4,P1) (PLO1,PLO 6)
CLO 4 Distinguish system and application security threats and vulnerabilities (PLO1,PLO 9)
9 Transferable Skills:
• Communication and leadership skills
• Lifelong learning and information management
• Social skills and Responsibilities.
10 Teaching Learning Assessment Strategy:
PLO Teaching and Learning Type of Assessment
Activities
Knowledge. Lecture Written Tests
Communication and leadership Group Discussion Assignment
skills
Lifelong learning and Tutorial Assignment
information management
Social skills and Tutorial Written Tests
Responsibilities.
11 Synopsis:
The course deals with only one half of the security equation. To build .highly secure networks,
professionals need to be aware of different methods of hacking and at the same time know how to
make networks secure from these intrusions using firewalls, UTMs, antivirus, etc.
12 Mode of Delivery: Lecture, Tutorial, Group Discussion.
13 Assessment Methods and Types:
Type of Assessment Assessment Method Percentage
Quizzes 10
Written test Test 20
Final Examination 50
Assignment 1 Written Assignment (1000 words) 10
Assignment 2 Written Assignment (1000 words) 10
14 Mapping of course to Programme Aims:
PEO
PEO 1 PEO 2 PEO 3 PEO 4
CLO
CLO 1 √
CLO 2 √ √
CLO 3 √ √
CLO 4 √ √
15 Mapping of course to Programme Learning Outcomes (PLO):

PLO
PLO 1 PLO 2 PLO 3 PLO 4 PLO 5 PLO 6 PLO 7 PLO 8 PLO 9
CLO
CLO 1 √
CLO 2 √ √
CLO 3 √ √
CLO 4 √ √
16 Content outline of the course and the SLT per topic::
Face to Face Independent Learning
Content L T P O L T P O TLT
I Introduction:
• Codes and Ciphers
• Some Classifiable systems
• Statistical theory of cipher systems
3 1.5 - - 3 1.5 - - 9
• Complexity theory of crypto
systems
• Stream ciphers
• Block ciphers
II Stream Ciphers:
• Rotor based system
• shift register based systems
• Design considerations for stream 3 1.5 - - 3 1.5 - - 9
ciphers
• Cryptanalysis of stream ciphers
• Combined encryption
III Block Ciphers
• DES and variant,
• Modes of use of DES
• Public key systems
• knapsack systems
3 1.5 - - 3 1.5 - - 9
• RSK
• Diffle Hellman Exchange
• Authentication and Digital
signatures
• Elliptic curve based systems.
IV System Identification and clustering:
3 1.5 - - 3 1.5 - - 9
• Cryptology of speech signals
• Narrow band and wide band
systems Analogue & Digital
• Systems of speech encryption
V Security: Hash function – Authentication:
• Protocols 3 1.5 - - 3 1.5 - - 9
• Digital Signature standards.
VI Electronics Mail Security
• PGP (Pretty Good Privacy) MIME 3 1.5 - - 3 1.5 - - 9
• Data Compression technique.
VII IP Security:
• Architecture
• Authentication Leader 3 1.5 - - 3 1.5 - - 9
• Encapsulating security Payload
• Key Management
VIII Web security:
• Secure Socket Layer & Transport
Layer security,
• Secure electronic transactions.
• Firewalls Design principle
• Established systems.
• Telecommunication Network
Architecture, Management
Information Model 9 4.5 - - 9 4.5 - - 27
• Management servicing and
functions Structure of management
information
• TMN information model
• SNMP v1, SNMP2 & SNMP3,
• RMON1 & 2
• Broadband Network Management
(ATM, HFC, DSL), ASN
IX Intrusion Techniques
• Foot Printing
• Social Engineering.
• Scanning Exploits.
5 3 - - 5 3 - - 16
• System Hacking.
• Web Server Hacking
• Countermeasures
• Patching the vulnerabilities
X Firewalls and UTM
• Cisco PIX / ASA
• Types of Firewalls, Installation of
PIX / ASA
• Bridge Mode
• Basic Configuration
• NAT
5 3 - - 5 3 - - 16
• Authentication
• Logging, Monitoring
• IPSEC VPN
• SSL VPN
• Backup and Restore
• ASQ (IPS) and QoS
• SEISMO
TOTAL 40 21 0 40 21 0 0 122
Face to Face Independent Learning
Lecture 40 40
Tutorial 21 21
Assignment 1 ( 2000 words) - 10
Assignment 2 ( 2000 words) - 10
Quizzes 01 03
Test 01 03
Final Examination 03 09
Total 66 96
162
Credit Hour 4
17 Main references supporting the course:
Richard, A. C. & Robert, K. (2012). Cyber War: The Next Threat to National Security and What to Do About
It. Ecco.
Additional references supporting the course
Jason, A., & Steve, W. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners.
Syngress

You might also like