0% found this document useful (0 votes)
3 views4 pages

cyber security

The document outlines a lecture plan for a Cyber Security course at the University Institute of Sciences, detailing course coordinators, mission and vision statements, textbooks, course outcomes, and a comprehensive lecture schedule. It includes various teaching methods and assessment models to evaluate student performance. The course aims to enhance students' knowledge and employability in the field of Cyber Security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views4 pages

cyber security

The document outlines a lecture plan for a Cyber Security course at the University Institute of Sciences, detailing course coordinators, mission and vision statements, textbooks, course outcomes, and a comprehensive lecture schedule. It includes various teaching methods and assessment models to evaluate student performance. The course aims to enhance students' knowledge and employability in the field of Cyber Security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Printed on 3/1/2025 2:49:43 PM

LECTURE PLAN

Institute/Department UNIVERSITY INSTITUTE Program Bachelor of Science (Computer


OF SCIENCES (UIS) Science, Statistics and
Mathematics)(BS213)
Master Subject Coordinator Spriha Sharma Master Subject Coordinator E- E11092
Name: Code:
Course Name Cyber Security Course Code 24UCT-107

Institute/Department UNIVERSITY INSTITUTE Program Bachelor of Science (Computer


OF SCIENCES (UIS) Science, Statistics and
Mathematics)(BS213)
Master Subject Coordinator Harish Nagar Master Subject Coordinator E- E11866
Name: Code:
Course Name Cyber Security Course Code 24UCT-107

Institute/Department UNIVERSITY INSTITUTE Program Bachelor of Science (Computer


OF SCIENCES (UIS) Science, Statistics and
Mathematics)(BS213)
Master Subject Coordinator Devinder Singh Master Subject Coordinator E- E12285
Name: Code:
Course Name Cyber Security Course Code 24UCT-107

Institute/Department UNIVERSITY INSTITUTE Program Bachelor of Science (Computer


OF SCIENCES (UIS) Science, Statistics and
Mathematics)(BS213)
Master Subject Coordinator Surjeet Singh Chauhan Master Subject Coordinator E- E1315
Name: Code:
Course Name Cyber Security Course Code 24UCT-107

Lecture Tutorial Practical Self Study Credit Subject Type


1 0 0 0 1.00 T

Course Type Course Category Mode of Assessment Mode of Delivery

N.A Graded (GR) MCQ Based (MCQB) Theory (TH)

Mission of the M1 To provide the best infrastructure and teaching learning processes for grooming future mathematicians.
Department M2 To provide a stimulating teaching learning environment to produce qualified students who are equipped with deeper insight
and research skills in the field of Mathematics and allied domains.
M3 To inculcate scientific and analytical thinking abilities by organizing expert talks, workshops, and club activities.
M4 To provide state of art research facilities for high impact research.
M5 To motivate faculty and students quality research and publications through seminars, dissertations, conferences, and national /
international journals of repute.
M6 To promote socially relevant research and innovation in mathematics and interdisciplinary domains

Vision of the To emerge as an elite institution to disseminate scientific temperament, advanced scientific knowledge and provide a platform for
Department research and innovation for serving the society

University Information System - By - ERP Division Page 1 of 4


Printed on 3/1/2025 2:49:43 PM
LECTURE PLAN

Text Books
Sr No Title of the Book Author Name Volume/Edition Publish Hours Years
1 Beginner's guide to computer . 1 . .
hacking
2 The art of Invisibility . 1 Big data 2000

Reference Books
Sr No Title of the Book Author Name Volume/Edition Publish Hours Years
1 The ghost in the wires 1 1 1 2000

Course OutCome
SrNo OutCome
CO1 To make student learn all course subjects
CO2 To enhance the employability skills to make student well versed with the subject
CO3 To make student clear all placement and govt jobs

Lecture Plan Preview-Theory


Mapped with
Pedagogical
Unit No LectureNo ChapterName Topic Text/ Reference Books CO Numer
Tool**
(s)
1 1 Computer .. ,T-Beginner's guide to computer Video CO1
fundamentals h,T-The art of Invisibility,R-The Lecture
ghost in the wires
1 2 Hardware and Hardwares ,T-Beginner's guide to computer Activity,Case CO1
Peripherals, h,T-The art of Invisibility,R-The Study,Flippe
Input Devices, ghost in the wires d
Hard Drives, Classes,Info
Output graphics,Inst
Devices. Ports ructor Lead
and Connectors WorkShop,P
PT,Professo
r of
Practice/Adj
unct
Faculty/Visiti
ng
Professor,R
eports,Simul
ation,Video
Lecture
1 3 Introduction to Cyberspace ,T-Beginner's guide to computer Video CO1
Cyberspace, h,T-The art of Invisibility,R-The Lecture
Security, Threat ghost in the wires
and Cyber
Incidences.
Goals of Cyber
Security,
Vulnerabilities
and Risk.
1 4 basic concepts Web technology ,T-Beginner's guide to computer PPT,Video CO1
on h,T-The art of Invisibility,R-The Lecture
communication ghost in the wires
and web
technology
1 5 Data transfer Data transfer and governance ,T-Beginner's guide to computer PPT,Video CO1
and h,T-The art of Invisibility,R-The Lecture
governance ghost in the wires

University Information System - By - ERP Division Page 2 of 4


Printed on 3/1/2025 2:49:43 PM
LECTURE PLAN

2 6 Data in internet Data in internet ,T-Beginner's guide to computer PPT,Video CO2


with h,T-The art of Invisibility,R-The Lecture
introduction to ghost in the wires
Application,
Network and
Physical layer.
Governance
and Governing
the Internet.
2 7 Introduction to Introduction to confidentiality ,T-Beginner's guide to computer PPT,Video CO2
confidentiality, h,T-The art of Invisibility,R-The Lecture
integrity and ghost in the wires
authentication
(CIA – Triad)
and their
importance.
Other way of
defining Cyber
Security and
scope of Cyber
Security.
2 8 Classification of Classification of cybercrimes ,T-Beginner's guide to computer PPT,Video CO2
cybercrimes, h,T-The art of Invisibility,R-The Lecture
Hackers and ghost in the wires
types of
Hackers,
Threat Actors:
Criminal
Organization,
Cyber Crime
Case Studies
2 9 Farming effects Farming effects and primary effects ,T-Beginner's guide to computer PPT,Video CO2
and Primary h,T-The art of Invisibility,R-The Lecture
Effects in Cyber ghost in the wires
Security. A
Strategic
approach to
Cyber Security
2 10 Cyber crime Cyber crime case studies ,T-Beginner's guide to computer PPT,Video CO2
case studies h,T-The art of Invisibility,R-The Lecture
ghost in the wires
3 11 Hackers as Hackers as cyber criminals ,T-Beginner's guide to computer Video CO3
Cyber h,T-The art of Invisibility,R-The Lecture
Criminals ghost in the wires
3 12 reconnaissance Cyber criminals ,T-Beginner's guide to computer PPT,Video CO3
and h,T-The art of Invisibility,R-The Lecture
weaponization ghost in the wires
by cyber
criminals
3 13 All about all about security governance ,T-Beginner's guide to computer PPT,Video CO3
security h,T-The art of Invisibility,R-The Lecture
governance, ghost in the wires
Security and
Information
Privacy,
Phishing attack
3 14 Safe browsing Safe browsing ,T-Beginner's guide to computer PPT,Video CO3
practices and h,T-The art of Invisibility,R-The Lecture
virtual private ghost in the wires
network.
Security Tools,
Firewalls,
Antivirus,
Penetration
test,
Vulnerability
test and
Introduction to
Cryptography.

University Information System - By - ERP Division Page 3 of 4


Printed on 3/1/2025 2:49:43 PM
LECTURE PLAN

3 15 security tools, security tools, firewalls, Antivirus ,T-Beginner's guide to computer PPT,Video CO3
firewalls, h,T-The art of Invisibility,R-The Lecture
Antivirus ghost in the wires

Assessment Model
Sr No Assessment Name Exam Name Max Marks
1 20SU06 External Theory 60
2 20SU06 Assignment/PBL 10
3 20SU06 Attendance Marks 2
4 20SU06 Mid-Semester Test-1 20
5 20SU06 Quiz 4
6 20SU06 Surprise Test 12
7 20SU06 Mid-Semester Test-2 20

University Information System - By - ERP Division Page 4 of 4

You might also like