M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus IT Security-Threats and Vulnerability

IT Security-Threats and Vulnerability Detailed Syllabus for Cyber Forensics & Information Security / Cyber Security M.Tech first year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for IT Security-Threats and Vulnerability M.Tech 2017-2018 (R17) first year second sem is as follows.

M.Tech. I Year II Sem.

UNIT- I  : Information Security: Introduction, How Much of Our Daily Lives Relies on Computers, Security Truisms, Basic Security, Terminology, Cyber Ethics, The Perception of Security, Threat Model, Security Is a Multidisciplinary Topic, Security Role-Playing Characters

UNIT – II : Passwords under Attack: Introduction, Authentication Process, Password Threats, Strong Passwords, Password Management. Email Security – Introduction, Email Systems, Email Security and Privacy

UNIT- III : Malware The Dark Side of Software, What Is Malware?, How Do I Get Malware?, What Does Malware Do?, Malware: Defense in Depth, Introduction, Data Backup, Firewalls, Software Patches, Antivirus Software, User Education Securely Surfing the World Wide Web: Introduction, Web Browser, “HTTP Secure”, Web Browser History, Online Shopping, Consumer Decisions, Spyware and Key-Loggers, Wireless Sniffing, Scams and Phishing Websites, Misuse and Exposure of Information

UNIT – IV : Wireless Internet Security: Introduction, How Wireless Networks Work, Wireless Security Threats, Public Wi-Fi Security, Wireless Network Administration Social Networking: Introduction, Choose Your Friends Wisely, Information Sharing, Malware and Phishing

UNIT – V : Social Engineering: Phishing for Suckers: Introduction, Social Engineering: Malware Distribution Phishing, Detecting a Phishing URL, Application of Knowledge Staying Safe Online: The Human Threat: Introduction, The Differences between Cyberspace and the Physical World, Consider the Context: Watch What You Say and How It Is Communicated, What You Do on the Internet Lasts Forever, Nothing Is Private, Now or in the Future, Can You Really Tell Who You Are Talking with?, Cameras and Photo Sharing, I Am a Good Person, That Would Never Happen to Me, Is There Anything I Can Do to Make the Internet a Safer Place for My Child?

TEXTBOOKS

  • Douglas Jacobson, Joseph Idziorek, “Computer Security Literacy: Staying Safe in a Digital World”, CRC Press

REFERENCES

  • Elementary Information Security, 2/e by Richard E Smith
  • Hacker Techniques, Tools, and Incident Handling, 2/e by Sean Philip Oriyano
  • Fundamentals of Information Systems Security, 3/e by David Kim & Michael G. Solomon
  • Internet Security: How to Defend Against Attackers on the Web, 2/e by Mike Harwood

For all other M.Tech 1st Year 2nd Sem syllabus go to JNTUH M.Tech Cyber Forensics & Information Security / Cyber Security 1st Year 2nd Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.