CSE, 1st Sem, 4th Year, Syllabus

JNTUH B.Tech 4th Year 1 sem Computer Science and Engineering R13 (4-1) Information Security Assessments & Audits (Security Analyst – II) R13 syllabus.

JNTUH B.Tech 4th year (4-1) Information Security Assessments & Audits gives you detail information of Information Security Assessments & Audits (Security Analyst – II) R13 syllabus It will be help full to understand you complete curriculum of the year.

Unit – I

Information Security Performance Metrics and Audit: Security Metrics and Reporting, Common Issues and Variances of Performance Metrics, Introduction to Security Audit, Servers and Storage devices, Infrastructure and Networks, Communication Routes, Information Security Methodologies (Black-box, White-box, Grey-box), Phases of Information Security Audit and Strategies, Ethics of an Information Security Auditor etc. Maintain Healthy, Safe & Secure Working environment (NOS 9003).

Unit – II

Information Security Audit Tasks, Reports and Post Auditing Actions: Pre-audit checklist, Information Gathering, Vulnerability Analysis, External Security Audit, Internal Network Security Audit, Firewall Security Audit, IDS Security Auditing, Social Engineering Security Auditing, Web Application Security Auditing, Information Security Audit Deliverable 8 Writing Report, Result Analysis, Post Auditing Actions, Report Retention etc. Provide Data information in Standard formats (NOS 9004).

Unit – III

Vulnerability Management: Information Security Vulnerabilities — Threats and Vulnerabilities, Human-based Social Engineering, Computer- based Social Engineering, Social Media Countermeasures, Vulnerability Management — Vulnerability Scanning, Testing, Threat management, Remediation etc.

Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.

TEXT BOOKS Prescribed books

  • Assessing Information Security (strategies, tactics, logic and framework) by A Vladimirov, K.Gavrilenko, and A. Michajlowski
  • The Art of Computer Virus Research and Defense by Peter Szor.

REFERENCES

  • https:Itvw,w sans. oreadig-room/whitepapers/threats1implemenhing-vulnerability-management-process-34180
  • http:Ilcsrc. nist.Qovlpublications/nistpubs/800-40-Ver2/SP800-40v2.pdf

For more information about all JNTU updates please stay connected to us on FB and don’t hesitate to ask any questions in the comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.