{"id":5211,"date":"2018-01-20T07:22:45","date_gmt":"2018-01-20T07:22:45","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=5211"},"modified":"2019-07-15T08:57:39","modified_gmt":"2019-07-15T08:57:39","slug":"jntuh-b-tech-2016-2017-r16-detailed-syllabus-cyber-security","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-2016-2017-r16-detailed-syllabus-cyber-security\/","title":{"rendered":"JNTUH B.Tech 2016-2017 (R16) Detailed Syllabus Cyber Security"},"content":{"rendered":"<p>Cyber Security Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Cyber Security B.Tech 2016-2017 (R16) third year second sem is as follows.<\/p>\n<p>B.Tech. III Year II Sem. \u00a0 \u00a0 \u00a0L\/T\/P\/C<br \/>\nCourse Code:CS623OE \u00a0 \u00a0 \u00a0 \u00a0 \u00a03\/0\/0\/3<\/p>\n<p><strong>UNIT- I: \u00a0Introduction to Cybercrime:<\/strong> Introduction, Cybercrime, and Information Security, Who are\u00a0Cybercriminals, Classifications of Cybercrimes, And Cybercrime: The legal Perspectives and\u00a0Indian Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on\u00a0Cybercrimes.<\/p>\n<p><strong>UNIT &#8211; II:\u00a0Cyber Offenses<\/strong>: How Criminals Plan Them: Introduction, How Criminals plan the\u00a0Attacks, Social Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel\u00a0for Cybercrime, Attack Vector, Cloud Computing.<\/p>\n<p><strong>UNIT &#8211; III:\u00a0Cybercrime:<\/strong> Mobile and Wireless Devices: Introduction, Proliferation of Mobile and\u00a0Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing\u00a0Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,\u00a0Authentication service Security, Attacks on Mobile\/Cell Phones, Mobile Devices: Security\u00a0Implications for Organizations, Organizational Measures for Handling Mobile,\u00a0Organizational Security Policies an Measures in Mobile Computing Era, Laptops.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p><strong>TEXT BOOK:<\/strong><\/p>\n<ul>\n<li>Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal\u00a0Perspectives, Nina Godbole and Sunil Belapure, Wiley INDIA.<\/li>\n<\/ul>\n<p><strong>REFERENCE BOOK:<\/strong><\/p>\n<ul>\n<li>Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC\u00a0Press.<\/li>\n<li>Introduction to Cyber Security , Chwan-Hwa(john) Wu,J.David Irwin.CRC Press\u00a0T&amp;F Group<\/li>\n<\/ul>\n<p>For all other B.Tech 3rd Year 2nd Sem syllabus go to <a href=\"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-third-year-second-sem-information-technology-course-structure-2016-2017-r16-batch\/\">JNTUH B.Tech Information Technology 3rd\u00a0Year 2nd Sem Course Structure for (R16) Batch.<\/a><\/p>\n<p>All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-5211","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=5211"}],"version-history":[{"count":3,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5211\/revisions"}],"predecessor-version":[{"id":18466,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5211\/revisions\/18466"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=5211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=5211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=5211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}