Syllabus

JNTUH B.Tech 4th Year 1 sem Information Technology R13 (4-1) Information Security Assessments and Audits (Security Analyst – II) (Elective – I) R13 syllabus.

JNTUH B.Tech 4th year (4-1) Information Security Assessments and Audits (Security Analyst – II) gives you detail information of Information Security Assessments and Audits (Security Analyst – II) (Elective – I) R13 syllabus It will be help full to understand you complete curriculum of the year.

Unit I

Information Security Performance Metrics and Audit: Security Metrics and Reporting, Common Issues and Variances of Performance Metrics, Introduction to Security Audit, Servers and Storage devices, Infrastructure and Networks, Communication Routes, Information Security Methodologies (Black-box, White-box, Grey-box), Phases of Information Security Audit and Strategies, Ethics of an Information Security Auditor etc. Maintain Healthy, Safe & Sec tire Working environment (NOS 9003).

Unit II

Information Security Audit Tasks, Reports and Post Auditing Actions: Pre-audit checklist, Information Gathering, Vulnerability Analysis, External Security Audit, Internal Network Security Audit, Firewall Security Audit, IDS Security Auditing, Social Engineering Security Auditing, Web Application Security Auditing, Information Security Audit Deliverable & Writing Report, Result Analysis, Post Auditing Actions, Report Retention etc. Provide Data information in Standard formats (NOS 9004).

Unit III

Vulnerability Management: Information Security Vulnerabilities — Threats and Vulnerabilities, Human-based Social Engineering, Computer- based Social Engineering, Social Media Countermeasures, Vulnerability Management — Vulnerability Scanning, Testing, Threat management, Remediation etc.

Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.

TEXT BOOKS

Prescribed books:

  • Assessing Information Security (strategies, tactics, logic and framework) by A Vladimirov, K.Gavrilenko, and A. Michajlowski
  • “The Art of Computer Virus Research and Defense by Peter Szor.

REFERENCES

  • htt rxllcsrc. fist. gov/publications/nistpubs/800-40-Ver2ISP800-40v2. pdf

For more information about all JNTU updates please stay connected to us on FB and don’t hesitate to ask any questions in the comment.

1 Comment

  1. k srinivas

    provide text book r materiel

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.