{"id":54924,"date":"2023-08-27T04:00:52","date_gmt":"2023-08-27T04:00:52","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/cei336-cyber-security-syllabus-for-eie-2021-regulation-professional-elective-i\/"},"modified":"2023-08-27T04:00:52","modified_gmt":"2023-08-27T04:00:52","slug":"cei336-cyber-security-syllabus-for-eie-2021-regulation-professional-elective-i","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/cei336-cyber-security-syllabus-for-eie-2021-regulation-professional-elective-i\/","title":{"rendered":"CEI336: Cyber Security syllabus for EIE 2021 regulation (Professional Elective-I)"},"content":{"rendered":"<p align=\"justify\">Cyber Security detailed syllabus for Electronics &amp; Instrumentation Engineering (EIE) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the EIE students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Electronics &amp; Instrumentation Engineering 5th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/eie-5th-sem-syllabus-2021-regulation\">EIE 5th Sem 2021 regulation scheme<\/a>. For Professional Elective-I scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/professional-elective-i-syllabus-for-eie-2021-regulation\">EIE Professional Elective-I syllabus scheme<\/a>. The detailed syllabus of cyber security is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit I<\/h4>\n<p>INTRODUCTION<br \/>\nIndustrial security environment-Industrial automation and control system(IACS) culture Vs IT Paradigms-Cyberattacks: Threat sources and steps to successful cyberattacks\n<\/p>\n<p><h4>Unit II<\/h4>\n<p>RISK ANALYSIS<br \/>\nRisk identification, classification and assessment, Addressing risk:Cybersecurity Management System(CSMS), organizational security, physical and environmental security, network segmentation, access control, risk management and implementation.\n<\/p>\n<p><h4>Unit III<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit IV<\/h4>\n<p>CYBERSECURITY DESIGN AND IMPLEMENTATION<br \/>\nCybersecurity lifecycle- conceptual design process- detailed design process- firewall designremote access design- intrusion detection design\n<\/p>\n<p><h4>Unit V<\/h4>\n<p>TESTING AND MAINTENANCE<br \/>\nDeveloping test plans- cybersecurity factory acceptance testing- site acceptance testingnetwork and application diagnostics and troubleshooting- cybersecurity audit procedure- IACS incident response<\/p>\n<p><h4>Skill Development Activities<\/h4>\n<p>(Group Seminar\/Mini Project\/Assignment\/Content Preparation \/ Quiz\/ Surprise Test \/ Solving GATE questions\/ etc)<\/p>\n<ol>\n<li>Analysis of various security tools.<\/li>\n<li>Standards in cyber security.<\/li>\n<li>Study the steps to remove Passwords from Microsoft Word.<\/li>\n<li>Steps to ensure Security of any one web browser (Mozilla Firefox\/Google Chrome).<\/li>\n<li>Analysis the security vulnerabilities of E-Mail Application.<\/li>\n<\/ol>\n<p><h4>Course Outcomes:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Ronald L and Krutz, Industrial Automation and Control System Security Principles,ISA, 2013.<\/li>\n<li>David J.Teumim, Network Security, Second edition,ISA,2010<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>Edward J.M. Colbert and Alexander Kott, Cyber-security of SCADA and other industrial control systems, Springer, 2016.<\/li>\n<li>Perry S. Marshalland John S. Rinaldi, Industrial Ethernet, Second edition, ISA, 2004<\/li>\n<li>Christopher Hadnagy and Seth Schulman, Human Hacking,Win Friends, Influence People, and Leave Them Better Off for Having Met You, Harper Buisness. January 2021<\/li>\n<\/ol>\n<p><h4>List of Open Source Software\/ Learning Website:<\/h4>\n<ol>\n<li>https:\/\/nptel.ac.in\/courses\/106106129<\/li>\n<li>https:\/\/www.cisco.com\/c\/en_in\/products\/security\/what-is-cybersecurity.html<\/li>\n<li>https:\/\/www.techtarget.com\/searchsecurity\/definition\/cybersecurity<\/li>\n<li>https:\/\/www.simplilearn.com\/tutorials\/cyber-security-tutorial\/what-is-cyber-security<\/li>\n<li>https:\/\/ocw.mit.edu\/courses\/6-857-network-and-computer-security-spring-2014\/resources\/mit6_857s14_lec01\/<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Electronics &amp; Instrumentation Engineering 5th Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/eie+5th-sem\">EIE 5th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Electronics &amp; Instrumentation Engineering results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University EIE all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security detailed syllabus for Electronics &amp; Instrumentation Engineering (EIE) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the EIE students. For [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[75],"tags":[],"class_list":["post-54924","post","type-post","status-publish","format-standard","hentry","category-eie"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/54924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=54924"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/54924\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=54924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=54924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=54924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}