M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Information Security and Audit

Information Security and Audit Detailed Syllabus for Software Engineering M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Information Security and Audit M.Tech 2017-2018 (R17) first year second sem is as follows.

M.Tech. I Year II Sem.

Course Objectives:
To introduce the fundamental concepts and techniques in computer and network security, giving students an overview of information security and auditing, and to expose students to the latest trend of computer attack and defense. Other advanced topics on information security such as mobile computing security, security and privacy of cloud computing, as well as secure information system development will also be discussed.

UNIT – I : A model for Internetwork security, Conventional Encryption Principles & Algorithms (DES, AES, RC4, Blowfish), Block Cipher Modes of Operation, Location of Encryption Devices, Key Distribution. Public key cryptography principles, public key cryptography algorithms (RSA, Diffie-Hellman, ECC), public Key Distribution.

UNIT – II : Approaches of Message Authentication, Secure Hash Functions (SHA-512, MD5) and HMAC, Digital Signatures, Kerberos, X.509 Directory Authentication Service, Email Security: Pretty Good Privacy (PGP) IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key Management.

UNIT – III : Web Security: Requirements, Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction (SET). Firewalls: Firewall Design principles, Trusted Systems, Intrusion Detection Systems

UNIT – IV : Auditing For Security: Introduction, Basic Terms Related to Audits, Security audits, The Need for Security Audits in Organization, Organizational Roles and Responsibilities for Security Audit, Auditors Responsibility In Security Audits, Types Of Security Audits.

UNIT – V : Auditing For Security: Approaches to Audits, Technology Based Audits Vulnerability Scanning And Penetration Testing, Resistance to Security Audits, Phase in security audit, Security audit Engagement Costs and other aspects, Budgeting for security audits, Selecting external Security Consultants, Key Success factors for security audits.

TEXT BOOKS:

  • Cryptography and Network Security by William Stallings, Fourth Edition, Pearson Education 2007.
  • Network Security Essentials (Applications and Standards) by William Stallings Pearson Education, 2008.
  • Cryptography & Network Security by Behrouz A. Forouzan, TMH 2007.
  • Information Systems Security by Nina Godbole, WILEY 2008.

REFERENCE BOOKS:

  • Information Security by Mark Stamp, Wiley – INDIA, 2006.
  • Fundamentals of Computer Security, Springer.
  • Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
  • Computer Security Basics by Rick Lehtinen, Deborah Russell & G. T. Gangemi Sr., SPD O’REILLY 2006.
  • Modern Cryptography by Wenbo Mao, Pearson Education 2007.
  • Principles of Information Security, Whitman, Thomson.

For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Software Engineering 1st Year 2nd Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.