{"id":55850,"date":"2023-08-28T16:09:10","date_gmt":"2023-08-28T16:09:10","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/ccs340-cyber-security-syllabus-for-csbs-2021-regulation-professional-elective-iii\/"},"modified":"2023-08-28T16:09:10","modified_gmt":"2023-08-28T16:09:10","slug":"ccs340-cyber-security-syllabus-for-csbs-2021-regulation-professional-elective-iii","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/ccs340-cyber-security-syllabus-for-csbs-2021-regulation-professional-elective-iii\/","title":{"rendered":"CCS340: Cyber Security syllabus for CS&amp;BS 2021 regulation (Professional Elective-III)"},"content":{"rendered":"<p align=\"justify\">Cyber Security detailed syllabus for Computer Science &amp; Business Systems (CS&amp;BS) for 2021 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the CS&amp;BS students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Computer Science &amp; Business Systems 6th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/cs-bs-6th-sem-syllabus-2021-regulation\">CS&amp;BS 6th Sem 2021 regulation scheme<\/a>. For Professional Elective-III scheme and its subjects refer to <a class=\"rank-math-link\" href=\"..\/professional-elective-iii-syllabus-for-cs-bs-2021-regulation\">CS&amp;BS Professional Elective-III syllabus scheme<\/a>. The detailed syllabus of cyber security is as follows. <\/p>\n<p><h4>Course Objectives:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit I<\/h4>\n<p>INTRODUCTION<br \/>\nCyber Security &#8211; History of Internet &#8211; Impact of Internet &#8211; CIA Triad; Reason for Cyber Crime -Need for Cyber Security &#8211; History of Cyber Crime; Cybercriminals &#8211; Classification of Cybercrimes &#8211; A Global Perspective on Cyber Crimes; Cyber Laws &#8211; The Indian IT Act &#8211; Cybercrime and Punishment.\n<\/p>\n<p><h4>Unit II<\/h4>\n<p>ATTACKS AND COUNTERMEASURES<br \/>\nOSWAP; Malicious Attack Threats and Vulnerabilities: Scope of Cyber-Attacks &#8211; Security Breach &#8211; Types of Malicious Attacks &#8211; Malicious Software &#8211; Common Attack Vectors &#8211; Social engineering Attack &#8211; Wireless Network Attack &#8211; Web Application Attack &#8211; Attack Tools &#8211; Countermeasures.\n<\/p>\n<p><h4>Unit III<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Unit IV<\/h4>\n<p>INTRUSION DETECTION<br \/>\nHost -Based Intrusion Detection &#8211; Network -Based Intrusion Detection &#8211; Distributed or Hybrid Intrusion Detection &#8211; Intrusion Detection Exchange Format &#8211; Honeypots &#8211; Example System Snort.\n<\/p>\n<p><h4>Unit V<\/h4>\n<p>INTRUSION PREVENTION<br \/>\nFirewalls and Intrusion Prevention Systems: Need for Firewalls &#8211; Firewall Characteristics and Access Policy &#8211; Types of Firewalls &#8211; Firewall Basing &#8211; Firewall Location and Configurations -Intrusion Prevention Systems &#8211; Example Unified Threat Management Products.\n<\/p>\n<p><h4>Practical Exercises<\/h4>\n<ol>\n<li>Install Kali Linux on Virtual box<\/li>\n<li>Explore Kali Linux and bash scripting<\/li>\n<li>Perform open source intelligence gathering using Netcraft, Whois Lookups, DNS Reconnaissance, Harvester and Maltego<\/li>\n<li>Understand the nmap command d and scan a target using nmap<\/li>\n<li>Install metasploitable2 on the virtual box and search for unpatched vulnerabilities<\/li>\n<li>Use Metasploit to exploit an unpatched vulnerability<\/li>\n<li>Install Linus server on the virtual box and install ssh<\/li>\n<li>Use Fail2banto scan log files and ban Ips that show the malicious signs<\/li>\n<li>Launch brute-force attacks on the Linux server using Hydra.<\/li>\n<li>Perform real-time network traffic analysis and data pocket logging using Snort<\/li>\n<\/ol>\n<p><h4>Course Outcomes:<\/h4>\n<h4 id=\"istudy\" style=\"text-align:center\"><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Download the iStudy App for all syllabus and other updates.<\/a><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px;text-align:center\"><\/a><\/h4>\n<p><h4>Text Books:<\/h4>\n<ol>\n<li>Anand Shinde, \u201cIntroduction to Cyber Security Guide to the World of Cyber Security\u201d, Notion Press, 2021 (Unit 1)<\/li>\n<li>Nina Godbole, Sunit Belapure, \u201cCyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives\u201d, Wiley Publishers, 2011 (Unit 1)<\/li>\n<li>https:\/\/owasp.org\/www-project-top-ten\/<\/li>\n<\/ol>\n<p><h4>Reference Books:<\/h4>\n<ol>\n<li>David Kim, Michael G. Solomon, \u201cFundamentals of Information Systems Security\u201d, Jones &amp; Bartlett Learning Publishers, 2013 (Unit 2)<\/li>\n<li>Patrick Engebretson, \u201cThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made easy\u201d, Elsevier, 2011 (Unit 3)<\/li>\n<li>Kimberly Graves, \u201cCEH Official Certified Ethical hacker Review Guide\u201d, Wiley Publishers, 2007 (Unit 3)<\/li>\n<li>William Stallings, Lawrie Brown, \u201cComputer Security Principles and Practice\u201d, Third Edition, Pearson Education, 2015 (Units 4 and 5)<\/li>\n<li>Georgia Weidman, \u201cPenetration Testing: A Hands-On Introduction to Hacking\u201d, No Starch Press, 2014 (Lab)<\/li>\n<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all the other subjects of Computer Science &amp; Business Systems 6th Sem, visit <a class=\"rank-math-link\" href=\"..\/category\/cs-bs+6th-sem\">CS&amp;BS 6th Sem subject syllabuses for 2021 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Computer Science &amp; Business Systems results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University CS&amp;BS all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security detailed syllabus for Computer Science &amp; Business Systems (CS&amp;BS) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the CS&amp;BS students. [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[146],"tags":[],"class_list":["post-55850","post","type-post","status-publish","format-standard","hentry","category-csbs"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=55850"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/55850\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=55850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=55850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=55850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}