{"id":5226,"date":"2018-01-20T08:43:42","date_gmt":"2018-01-20T08:43:42","guid":{"rendered":"http:\/\/www.inspirenignite.com\/jntuh\/?p=5226"},"modified":"2019-07-15T08:59:08","modified_gmt":"2019-07-15T08:59:08","slug":"jntuh-b-tech-2016-2017-r16-detailed-syllabus-information-security-management-security-analyst","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-b-tech-2016-2017-r16-detailed-syllabus-information-security-management-security-analyst\/","title":{"rendered":"JNTUH B.Tech 2016-2017 (R16) Detailed Syllabus Information Security Management (Security Analyst-I)"},"content":{"rendered":"<p>Information Security Management (Security Analyst-I) Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Information Security Management (Security Analyst-I) B.Tech 2016-2017 (R16) third year second sem is as follows.<\/p>\n<p>B.Tech. III Year II Sem. \u00a0 \u00a0 \u00a0L\/T\/P\/C<br \/>\nCourse Code:CS614PE \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 3\/0\/0\/3<\/p>\n<p><strong>Course Objectives:<\/strong><\/p>\n<ul>\n<li>To introduce the terminology, technology and its applications<\/li>\n<li>To introduce the concept of Security Analyst<\/li>\n<li>To introduce the tools, technologies &amp; programming languages which are used in day\u00a0to day security analyst job role<\/li>\n<\/ul>\n<p><strong>UNIT &#8211; I: \u00a0Information Security Management:<\/strong> Information Security Overview, Threats and Attack\u00a0Vectors, Types of Attacks, Common Vulnerabilities, and Exposures (CVE), Security Attacks,\u00a0Fundamentals of Information Security, Computer Security Concerns, Information Security\u00a0Measures etc.\u00a0Manage your work to meet requirements (NOS 9001)<\/p>\n<p><strong>UNIT &#8211; II: \u00a0Fundamentals of Information Security:<\/strong> Key Elements of Networks, Logical Elements of\u00a0Network, Critical Information Characteristics, Information States etc.\u00a0Work effectively with Colleagues (NOS 9002)<\/p>\n<p><strong>UNIT &#8211; III: \u00a0Data Leakage<\/strong>: What is Data Leakage and statistics, Data Leakage Threats, Reducing the\u00a0Risk of Data Loss, Key Performance Indicators (KPI), Database Security etc.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"color: #ff0000\">Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier<\/span>.<\/strong><\/a><\/p>\n<p><strong>TEXT BOOKS:<\/strong><\/p>\n<ul>\n<li>Management of Information Security by Michael E. Whitman and Herbert J. Mattord<\/li>\n<\/ul>\n<p><strong>REFERENCES:<\/strong><\/p>\n<ul>\n<li>http:\/\/www.iso.org\/iso\/home\/standards\/management-standards\/iso27001.htm<\/li>\n<li>http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-55-Rev1\/SP800-55-rev1.pdf<\/li>\n<\/ul>\n<p>For all other B.Tech 3rd Year 2nd Sem syllabus go to <a href=\"https:\/\/www.inspirenignite.com\/jntuh\/jntuh-third-year-second-sem-information-technology-course-structure-2016-2017-r16-batch\/\">JNTUH B.Tech Information Technology 3rd\u00a0Year 2nd Sem Course Structure for (R16) Batch.<\/a><\/p>\n<p>All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information Security Management (Security Analyst-I) Detailed Syllabus for B.Tech third year second sem is covered here. This gives the details about credits, number of hours and other details along with [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[62],"tags":[],"class_list":["post-5226","post","type-post","status-publish","format-standard","hentry","category-syllabus"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/comments?post=5226"}],"version-history":[{"count":3,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5226\/revisions"}],"predecessor-version":[{"id":18470,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/posts\/5226\/revisions\/18470"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/media?parent=5226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/categories?post=5226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/jntuh\/wp-json\/wp\/v2\/tags?post=5226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}