Download • Overview of Cyber Security & need of cyber security • Introduction

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cryptography wikipedia , lookup

Cryptanalysis wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Information security wikipedia , lookup

Unix security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Airport security wikipedia , lookup

Hacker wikipedia , lookup

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Mobile security wikipedia , lookup

International cybercrime wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Cyberwarfare wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cyberattack wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
COMPUTER SCIENCE AND ENGINEERING DEPARTMENT
Name of Course
Cyber Threats and Computer Security Measures
O.Plan No.
CS1
Dates and Venue
13-24 April, 2015 IPU, Delhi
Course Contents


























Course Coordinator, email
address and phone number
Overview of Cyber Security & need of cyber security
Introduction to Kali Linux & Metasploit
Breaking Windows Security
Client Side Attacks
Information Gathering, Footprinting & Counter measures
Cryptography
Security Issues in WiFi
DNS & IP Spoofing
Phishing Techniques
Open Source Forensic Tools
Virtual Private Network
Wireshark
Implementing Secure Protocols
Public/Private Key Based Authentication
Mandatory Access Control using SElinux
Firewalls (Linux Based & Cisco ASA)
Intrusion Prevention System ( Linux Based & Cisco IPS 4210)
SQL Injection
Security Implementation using Hypervisor
Emerging Challenges of Cyber Crimes-Modus Operandi of
Criminals
Mobile Forensics
Data Hiding Techniques
Email header Analysis
Access Control Server
Website Security (AAA, RADIUS & TACACS+)
Social Etiquettes
Dr. Maitreyee Dutta, Mr. Pardeep Bansal, Mr. Amrendra Sharan, Mr. Saurabh
Kaushal
[email protected]