CF

5289C: Internet and Web Application Security Lab Syllabus for Cyber Forensics & Information Security 6th Sem 2021 Revision SITTTR (Professional Elective-II)

Internet and Web Application Security Lab detailed syllabus for Cyber Forensics & Information Security (CF) for 2021 revision curriculum has been taken from the SITTTRs official website and presented for the Cyber Forensics & Information Security (CF) students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Cyber Forensics & Information Security 6th Sem scheme and its subjects, do visit Cyber Forensics & Information Security (CF) 6th Sem 2021 regulation scheme. For Professional Elective-II scheme and its subjects refer to Cyber Forensics & Information Security (CF) Professional Elective-II syllabus scheme. The detailed syllabus of internet and web application security lab is as follows.

Course Objectives:

  • Presenting internet security systems and covering most important parts of cryptology through introducing many cryptography techniques and algorithms.
  • Explaining the hash function as an application of cryptography aligning with the concept of message integrity and digital signature authentication.
  • Understand the tools for web application vulnerability assessment and defending malwares.

Course Outcomes:

On completion of the course student will be able to:

  1. Presenting the most important substitution and transposition techniques in cyber security.
  2. Utilizing and code developing for encryption algorithms that required to achieve confidentiality key security.
  3. Building an appropriate encrypting system that designed for specific key size and message length.
  4. Presenting Tools for Intrusion Detection System,VulnerabilityAssessment and defeating malwares 1

Module 1:

  1. Perform encryption, decryption using the following substitution techniques i. Ceaser cipher ii. Playfair cipher iii. Hill Cipher iv. Vigenere cipher
  2. Perform encryption and decryption using following transposition techniques i. Rail fence ii. Row & Column Transformation

Module 2:

  1. Apply DES algorithm for practical applications.
  2. Apply AES algorithm for practical applications.
  3. Implement RSA Algorithm using HTML and JavaScript

Module 3:

  1. Implement the Diffie-Hellman Key Exchange algorithm for a given problem
  2. Calculate the message digest of a text using the SHA-1 algorithm.
  3. Implement the SIGNATURE SCHEME -Digital Signature Standard..

Module 4:

  1. Demonstrate intrusion detection system (ids) using any tool eg. Snort or any other s/w
  2. Automated Attack and Penetration Tools Exploring N-Stalker, a Vulnerability Assessment Tool
  3. Defeating Malware i. Building Trojans ii. Rootkit Hunter

Sample Open Ended Projects

( Students can do open ended experiments as a group of 2-3. There is no duplication in experiments between groups.)

  • Test website for vulnerabilities and threats. (can use Acunetix web vulnerability scanner (WVS) http :/ /www.acunetix.com /vulnerability-scanner
  • Parameter tampering attacks and Cross-site scripting (XSS o r CSS)

Text Books:

  1. Cryptography and Network Security: Principles and Practice, Global Edition, 7/E, William Stallings, Pearson
  2. Padmanabhan T R, Shyamala C and Harini N, “Cryptography and Security”, Wiley Publications 2011.

Online Resources

  1. https://www.tutorialspoint.com

For detailed syllabus of all other subjects of Cyber Forensics & Information Security, 2021 revision curriculum do visit Cyber Forensics & Information Security (CF) 6th Sem subject syllabuses for 2021 revision.

To see the syllabus of all other branches of diploma 2021 revision curriculum do visit SITTTR diploma all branches syllabus..

To see the results of Cyber Forensics & Information Security of diploma 2021 revision curriculum do visit SITTTR diploma results..

For all Cyber Forensics & Information Security academic calendars, visit Cyber Forensics & Information Security all semesters academic calendar direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.