IT Security-Threats and Vulnerability Detailed Syllabus for Computer Networks and Information Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.
The detailed syllabus for IT Security-Threats and Vulnerability M.Tech 2017-2018 (R17) first year second sem is as follows.
M.Tech. I Year II Sem.
UNIT- I : Information Security: Introduction, How Much of Our Daily Lives Relies on Computers, Security Truisms, Basic Security, Terminology, Cyber Ethics, The Perception of Security, Threat Model, Security Is a Multidisciplinary Topic, Security Role-Playing Characters
UNIT – II : Passwords under Attack: Introduction, Authentication Process, Password Threats, Strong Passwords, Password Management. Email Security – Introduction, Email Systems, Email Security and Privacy
UNIT- III : Malware The Dark Side of Software, What Is Malware?, How Do I Get Malware?, What Does Malware Do?, Malware: Defense in Depth, Introduction, Data Backup, Firewalls, Software Patches, Antivirus Software, User Education Securely Surfing the World Wide Web: Introduction, Web Browser, “HTTP Secure”, Web Browser History, Online Shopping, Consumer Decisions, Spyware and Key-Loggers, Wireless Sniffing, Scams and Phishing Websites, Misuse and Exposure of Information
UNIT – IV : Wireless Internet Security: Introduction, How Wireless Networks Work, Wireless Security Threats, Public Wi-Fi Security, Wireless Network Administration Social Networking: Introduction, Choose Your Friends Wisely, Information Sharing, Malware and Phishing
UNIT – V : Social Engineering: Phishing for Suckers: Introduction, Social Engineering: Malware Distribution Phishing, Detecting a Phishing URL, Application of Knowledge Staying Safe Online: The Human Threat: Introduction, The Differences between Cyberspace and the Physical World, Consider the Context: Watch What You Say and How It Is Communicated, What You Do on the Internet Lasts Forever, Nothing Is Private, Now or in the Future, Can You Really Tell Who You Are Talking with?, Cameras and Photo Sharing, I Am a Good Person, That Would Never Happen to Me, Is There Anything I Can Do to Make the Internet a Safer Place for My Child?
TEXTBOOKS
- Douglas Jacobson, Joseph Idziorek, “Computer Security Literacy: Staying Safe in a Digital World”, CRC Press
REFERENCES
- Elementary Information Security, 2/e by Richard E Smith
- Hacker Techniques, Tools, and Incident Handling, 2/e by Sean Philip Oriyano
- Fundamentals of Information Systems Security, 3/e by David Kim & Michael G. Solomon
- Internet Security: How to Defend Against Attackers on the Web, 2/e by Mike Harwood
For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Computer Networks and Information Security 1st Year 2nd Sem Course Structure for (R17) Batch.
All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.
Do share with friends and in case of questions please feel free drop a comment.