This domain focusses on two aspects of Cyber Security: analysis and assessment of risk plus how to minimize it, and, how to extract and use digital information from a wide range of systems and devices.
The domain is structured so that all students cover the same introductory material, but then choose to specialize in either Cyber Security or Digital Forensics.
Domain is used to secure important data from enemies.
It works as a safeguard of your computer from blackmail by the people who want to exploit the vulnerability.
Using domain, a company or organization can find out security vulnerability and risks.
The purpose of this domain is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure.
The domain entails finding and then attempting to exploit vulnerabilities to determine whether unauthorized access or other malicious activities are possible.
Domain Learning Outcomes:
The domain will cover basic digital forensics and network security, and also cover computer system tools and the Linux/UNIX operating system which are highly essential in the cyber world.
Able to deal with digital evidence in a professional manner (that includes adhering to appropriate legal guidelines).
It will then follow either the Cyber Security or Digital Forensics pathway within the course (though each leads to the same-named degree: the pathways are simply opportunities to specialize within the field).
In addition, all students will take a Research Methods module and complete a project module to devote them to the world of research for their future edifice and expertise.
Candidates after the completion of the domain have lucrative openings & scopes in the emerging areas surrounding research & development in academics, nuclear power plants, corporates, Govt. organization like railway, banking & also in national as well as International grounds with good designations as Chief Information Security Officer, Forensic Computer Analyst, Information Security Analyst, Digital Forensics Investigator, Digital Forensics specialist, Homeland Security Professional and many more.
After the completion of Cyber Security & Digital Forensics:
Overview of Information Security-Threats - Frauds, Thefts, Malicious Hackers, Malicious Code, Denial-of-Services Attacks and Social Engineering, Vulnerability–Types Database Security-Overview of Database - Database application security models-Data base auditing models-Application data auditing-Practices of database auditing. Data Loss prevention – Content Filtering - Device Control - Network DLP - Host DLP. Network Security & Web Security: Security Issues in TCP/IP – TCP, DNS, Routing (Topics such as basic problems of security in TCP/IP, IPsec, BGP Security, DNS Cache poisoning etc.), Network Défense tools – Firewalls, Intrusion Detection, Filtering, Distributed Firewalls, Security architecture of World Wide Web, Security Architecture of Web Servers, and Web Clients, Web Application Security –Cross-Site Scripting Attacks, Cross-Site Request Forgery, Https, Threat Modelling, Attack Surfaces.
Configuring Window Firewall.
Configuring Linux Firewall.
Adding users,setting permissions in windows.
Access control List in Linux.
Nmap scanning tool using both Linux and Windows.
Installing and configuration of Linux firewall iptables.
Study various methods for taping into wire.
Study the steps for installing Wireshark, the packet sniffing tool for performing Network Analysis.
Study of working with captured packets.
Study of advanced Wireshark features.
Study of security packet analysis.
Cyber Forensics (1-1-2) (50HRs)
Computer Forensics Investigation Process.
Recovering Deleted Files from the evidence.
Generating Hashes & Checksum Files.
Calculating the MD5 value of the selected File.
Viewing Files of Various Formats.
Handling Evidence Data.
Creating a Disk Image File of an HDD Partition.
Understanding HDD & its File Systems.
Recovering Deleted Files from Hard Disks Using WINHEX.
Analysing File System Types Using the Sleuth Kit.
Analyzing Raw Image Using Autopsy.
Data Acquisition & Duplication.
Investigating NTFS Drive Using DiskExplorer for NTFS.
Viewing Content of Forensic Image Using AccessData FTK Imager Tool.
Discovering & Extracting Hidden Forensic Material on Computers using Computer Forensics.
Extracting Information about Loaded Processes Using Process Explorer.
The viewing, Monitoring, and Analysing Events using the Event Log Explorer Tool.
Performing Computer Forensic Investigation using the Helix Tool.
Using Volatile Data in Linux System.
Analyzing Non-Volatile Data in Linux System.
Capturing and Analysing Logs of Computer using GFI Events Manager.
Investigating System Log Data Using Xpolog Center Suite.
Investigating Network Attacks using Kiwi Log Viewer.
Investigating Network traffic using Wireshark.
Investigating Web Attacks (Analysing Domain & IP Address Queries Using SmartWhois Tool.
Project (0-0-4) (Major)
Project from the field of Cybersecurity.
Live Setup and configuration using core tools and techniques.
Project from the field of Digital Forensics.
Live investigation Acquisition, analysis, and reporting using forensic tools and techniques.